<?xml version="1.0" encoding="UTF-8"?>
  <testsuites tests="467" disabled="322" errors="0" failures="1" time="3589.005260094">
      <testsuite name="Red Hat App Studio E2E tests" package="/tmp/tmp.O2kCCFO8V9/cmd" tests="467" disabled="88" skipped="234" errors="0" failures="1" time="3589.005260094" timestamp="2026-05-02T05:06:21">
          <properties>
              <property name="SuiteSucceeded" value="false"></property>
              <property name="SuiteHasProgrammaticFocus" value="false"></property>
              <property name="SpecialSuiteFailureReason" value=""></property>
              <property name="SuiteLabels" value="[]"></property>
              <property name="SuiteSemVerConstraints" value="[]"></property>
              <property name="SuiteComponentSemVerConstraints" value="[]"></property>
              <property name="RandomSeed" value="1777698239"></property>
              <property name="RandomizeAllSpecs" value="false"></property>
              <property name="LabelFilter" value="build-service"></property>
              <property name="SemVerFilter" value=""></property>
              <property name="FocusStrings" value=""></property>
              <property name="SkipStrings" value=""></property>
              <property name="FocusFiles" value=""></property>
              <property name="SkipFiles" value=""></property>
              <property name="FailOnPending" value="false"></property>
              <property name="FailOnEmpty" value="false"></property>
              <property name="FailFast" value="false"></property>
              <property name="FlakeAttempts" value="0"></property>
              <property name="DryRun" value="false"></property>
              <property name="ParallelTotal" value="20"></property>
              <property name="OutputInterceptorMode" value="none"></property>
          </properties>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build creates an application [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build creates an IntegrationTestScenario for the app [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build creates new branch for the build [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build creates component konflux-demo-component (private: false) from git source https://github.com/redhat-appstudio-qe/hacbs-test-project-konflux-demo [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Component is created triggers creation of a PR in the sample repo [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Component is created verifies component build status [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Component is created should eventually lead to triggering a &#39;push&#39; event type PipelineRun after merging the PaC init branch  [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Build PipelineRun is created does not contain an annotation with a Snapshot Name [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Build PipelineRun is created should eventually complete successfully [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Build PipelineRun completes successfully should validate Tekton TaskRun test results successfully [konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Build PipelineRun completes successfully should validate that the build pipelineRun is signed [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Build PipelineRun completes successfully should find the related Snapshot CR [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Build PipelineRun completes successfully should validate that the build pipelineRun is annotated with the name of the Snapshot [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Build PipelineRun completes successfully should find the related Integration Test PipelineRun [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when push pipelinerun is retriggered should eventually succeed [konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Integration Test PipelineRun is created should eventually complete successfully [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Integration Test PipelineRun completes successfully should lead to Snapshot CR being marked as passed [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Integration Test PipelineRun completes successfully should trigger creation of Release CR [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Release CR is created triggers creation of Release PipelineRun [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Release PipelineRun is triggered should eventually succeed [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Release PipelineRun is completed should lead to Release CR being marked as succeeded [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rhtap-service-push pipeline] Rhtap-service-push happy path Post-release verification verifies if the release CR is created [release-pipelines, rhtap-service-push, RhtapServicePush]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rhtap-service-push pipeline] Rhtap-service-push happy path Post-release verification verifies the rhtap release pipelinerun is running and succeeds [release-pipelines, rhtap-service-push, RhtapServicePush]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rhtap-service-push pipeline] Rhtap-service-push happy path Post-release verification verifies release CR completed and set succeeded. [release-pipelines, rhtap-service-push, RhtapServicePush]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rhtap-service-push pipeline] Rhtap-service-push happy path Post-release verification verifies if the PR in infra-deployments repo is created/updated [release-pipelines, rhtap-service-push, RhtapServicePush]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rh-advisories pipeline] Rh-advisories happy path Post-release verification verifies if release CR is created [release-pipelines, rh-advisories, rhAdvisories]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rh-advisories pipeline] Rh-advisories happy path Post-release verification verifies the advs release pipelinerun is running and succeeds [release-pipelines, rh-advisories, rhAdvisories]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rh-advisories pipeline] Rh-advisories happy path Post-release verification verifies release CR completed and set succeeded. [release-pipelines, rh-advisories, rhAdvisories]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rh-advisories pipeline] Rh-advisories happy path Post-release verification verifies if the repository URL is valid [release-pipelines, rh-advisories, rhAdvisories]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines triggers PipelineRun for symlink component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic with component name test-symlink-comp-uski [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci triggers PipelineRun for component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci triggers PipelineRun for component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci triggers PipelineRun for component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) should eventually finish successfully for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) should push Dockerfile to registry [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) floating tags are created successfully [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) image manifest mediaType is correct [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) check for source images if enabled in pipeline [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min should have Pipeline Records [build, build-templates, HACBS, pipeline-service, pipeline]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min should have Pipeline Logs [build, build-templates, HACBS, pipeline-service, pipeline]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) should validate tekton taskrun test results for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry verify-enterprise-contract check should pass [build, build-templates, HACBS, pipeline-service, pipeline, sbom, slow, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry should have Hermeto content in the SBOM in case the build was hermetic [build, build-templates, HACBS, pipeline-service, pipeline, sbom, slow, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) build-definitions ec pipelines runs ec pipeline pipelines/enterprise-contract.yaml [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) should eventually finish successfully for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) should push Dockerfile to registry [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) floating tags are created successfully [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) image manifest mediaType is correct [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) check for source images if enabled in pipeline [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build should have Pipeline Records [build, build-templates, HACBS, pipeline-service, pipeline]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build should have Pipeline Logs [build, build-templates, HACBS, pipeline-service, pipeline]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) should validate tekton taskrun test results for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry verify-enterprise-contract check should pass [build, build-templates, HACBS, pipeline-service, pipeline, sbom, slow, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry should have Hermeto content in the SBOM in case the build was hermetic [build, build-templates, HACBS, pipeline-service, pipeline, sbom, slow, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) build-definitions ec pipelines runs ec pipeline pipelines/enterprise-contract.yaml [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) should eventually finish successfully for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) should push Dockerfile to registry [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) floating tags are created successfully [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) image manifest mediaType is correct [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) check for source images if enabled in pipeline [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta should have Pipeline Records [build, build-templates, HACBS, pipeline-service, pipeline]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta should have Pipeline Logs [build, build-templates, HACBS, pipeline-service, pipeline]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) should validate tekton taskrun test results for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry verify-enterprise-contract check should pass [build, build-templates, HACBS, pipeline-service, pipeline, sbom, slow, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry should have Hermeto content in the SBOM in case the build was hermetic [build, build-templates, HACBS, pipeline-service, pipeline, sbom, slow, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) build-definitions ec pipelines runs ec pipeline pipelines/enterprise-contract.yaml [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines pipelineRun should fail for symlink component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic with component name test-symlink-comp-uski [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Same-Version Backup/Restore] when creating tenants and running initial pipelines should create both tenants concurrently [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Same-Version Backup/Restore] when creating tenants and running initial pipelines should wait for all build PipelineRuns to succeed [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Same-Version Backup/Restore] when backing up tenant data should create backup CRs for both tenants concurrently [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Same-Version Backup/Restore] when simulating disaster by deleting namespaces should delete both tenant namespaces [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Same-Version Backup/Restore] when restoring from backup should restore tenant-1 (KokoHazamar) via velero CLI method [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Same-Version Backup/Restore] when restoring from backup should restore tenant-2 (MosheKipod) via oc command method [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Same-Version Backup/Restore] when performing post-restore recovery should rotate SA tokens on both tenants [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Same-Version Backup/Restore] when verifying restored tenants should confirm structural integrity of both tenants [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Same-Version Backup/Restore] when verifying restored tenants should confirm functional pipeline execution after restore [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Backwards-Compat] when creating tenants on the old Konflux version should create both tenants concurrently [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Backwards-Compat] when creating tenants on the old Konflux version should wait for all build PipelineRuns to succeed [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Backwards-Compat] when backing up tenant data before upgrade should create backup CRs for both tenants concurrently [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Backwards-Compat] when simulating disaster by deleting namespaces should delete both tenant namespaces [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Backwards-Compat] when upgrading Konflux to the new version should upgrade the cluster and verify Velero survived [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Backwards-Compat] when restoring tenants from backup on the new Konflux version should restore tenant-1 (KokoHazamar) via velero CLI method [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Backwards-Compat] when restoring tenants from backup on the new Konflux version should restore tenant-2 (MosheKipod) via oc command method [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Backwards-Compat] when performing post-restore recovery should rotate SA tokens on both tenants [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Backwards-Compat] when verifying restored tenants should confirm structural integrity of both tenants [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Backwards-Compat] when verifying restored tenants should confirm functional pipeline execution after restore [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite [RELEASE-2136] Release CR fails when block-releases true in ReleasePlanAdmission.] post-release verification. block-releases true in ReleasePlanAdmission makes a Release CR set as failed in both IsReleased and IsValid with a proper message to user. [release-service, release-neg, negBlockReleases]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rh-push-to-redhat-io pipeline] Rh-push-to-redhat-io happy path Post-release verification verifies if the release CR is created [release-pipelines, rh-push-to-registry-redhat-io, PushToRedhatIO]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rh-push-to-redhat-io pipeline] Rh-push-to-redhat-io happy path Post-release verification verifies the rhio release pipelinerun is running and succeeds [release-pipelines, rh-push-to-registry-redhat-io, PushToRedhatIO]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rh-push-to-redhat-io pipeline] Rh-push-to-redhat-io happy path Post-release verification verifies release CR completed and set succeeded. [release-pipelines, rh-push-to-registry-redhat-io, PushToRedhatIO]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rh-push-to-redhat-io pipeline] Rh-push-to-redhat-io happy path Post-release verification verifies if the MR URL is valid [release-pipelines, rh-push-to-registry-redhat-io, PushToRedhatIO]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [task-suite tkn bundle task] creates Tekton bundles with different params when context points to a file [build-templates]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [task-suite tkn bundle task] creates Tekton bundles with different params creates Tekton bundles from specific context [build-templates]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [task-suite tkn bundle task] creates Tekton bundles with different params when context is the root directory [build-templates]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [task-suite tkn bundle task] creates Tekton bundles with different params creates Tekton bundles when context points to a file and a directory [build-templates]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [task-suite tkn bundle task] creates Tekton bundles with different params creates Tekton bundles when using negation [build-templates]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [task-suite tkn bundle task] creates Tekton bundles with different params allows overriding HOME environment variable [build-templates]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [task-suite tkn bundle task] creates Tekton bundles with different params allows overriding STEP image [build-templates]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite Release service happy path] Post-release verification verifies that a Release CR should have been created in the dev namespace [release-service, happy-path]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite Release service happy path] Post-release verification verifies that Release PipelineRun is triggered [release-service, happy-path]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite Release service happy path] Post-release verification verifies that Enterprise Contract Task has succeeded in the Release PipelineRun [release-service, happy-path]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite Release service happy path] Post-release verification verifies that a Release is marked as succeeded. [release-service, happy-path]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [upgrade-suite Create users and check their state] Verify AppStudioProvisionedUser [upgrade-verify]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [upgrade-suite Create users and check their state] creates AppStudioDeactivatedUser [upgrade-verify]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [upgrade-suite Create users and check their state] creates AppStudioBannedUser [upgrade-verify]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification verifies that the ReleasePlan CR is unmatched in the beginning [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification Creates ReleasePlanAdmission CR in corresponding managed namespace [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification when ReleasePlanAdmission CR is created in managed namespace verifies that the ReleasePlan CR is set to matched [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification when ReleasePlanAdmission CR is created in managed namespace verifies that the ReleasePlanAdmission CR is set to matched [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification Creates a manual release ReleasePlan CR in devNamespace [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification when the second ReleasePlan CR is created verifies that the second ReleasePlan CR is set to matched [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification when the second ReleasePlan CR is created verifies that the ReleasePlanAdmission CR has two matched ReleasePlan CRs [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification deletes one ReleasePlan CR [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification when One ReleasePlan CR is deleted in managed namespace verifies that the ReleasePlanAdmission CR has only one matching ReleasePlan [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification deletes the ReleasePlanAdmission CR [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification when ReleasePlanAdmission CR is deleted in managed namespace verifies that the ReleasePlan CR has no matched ReleasePlanAdmission [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for multi arch with rh-advisories pipeline] Multi arch test happy path Post-release verification verifies the release CR is created [release-pipelines, rh-advisories, multiarch-advisories, multiArchAdvisories]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for multi arch with rh-advisories pipeline] Multi arch test happy path Post-release verification verifies the multiarch release pipelinerun is running and succeeds [release-pipelines, rh-advisories, multiarch-advisories, multiArchAdvisories]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for multi arch with rh-advisories pipeline] Multi arch test happy path Post-release verification verifies release CR completed and set succeeded. [release-pipelines, rh-advisories, multiarch-advisories, multiArchAdvisories]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for multi arch with rh-advisories pipeline] Multi arch test happy path Post-release verification verifies if the repository URL is valid [release-pipelines, rh-advisories, multiarch-advisories, multiArchAdvisories]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite [HACBS-2360] Release CR fails when missing ReleasePlan and ReleasePlanAdmission.] post-release verification. missing ReleasePlan makes a Release CR set as failed in both IsReleased and IsValid with a proper message to user. [release-service, release-neg, negMissingReleasePlan]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite [HACBS-2360] Release CR fails when missing ReleasePlan and ReleasePlanAdmission.] post-release verification. missing ReleasePlanAdmission makes a Release CR set as failed in both IsReleased and IsValid with a proper message to user. [release-service, release-neg, negMissingReleasePlan]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when a new Component with specified custom branch is created does not contain an annotation with a Snapshot Name [integration-service, github-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when a new Component with specified custom branch is created should have a related PaC init PR created [integration-service, github-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when a new Component with specified custom branch is created initialized integration test status is reported to github [integration-service, github-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when a new Component with specified custom branch is created should lead to build PipelineRun finishing successfully [integration-service, github-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when the PaC build pipelineRun run succeeded checks if the BuildPipelineRun have the annotation of chains signed [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when the PaC build pipelineRun run succeeded checks if the Snapshot is created [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when the PaC build pipelineRun run succeeded checks if the Build PipelineRun got annotated with Snapshot name [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when the Snapshot was created should find both the related Integration PipelineRuns [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns are created should eventually complete successfully [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully should lead to Snapshot CR being marked as failed [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully eventually leads to the status reported at Checks tab for the successful Integration PipelineRun [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully eventually leads to the status reported at Checks tab for the failed Integration PipelineRun [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully eventually leads to the status reported at Checks tab for the optional Integration PipelineRun [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully eventually leads to the status reported at Checks tab for the warning Integration PipelineRun [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully checks if the optional Integration Test Scenario status is reported in the Snapshot [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully checks if the finalizer was removed from the optional Integration PipelineRun [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully checks if the warning Integration Test Scenario status is reported in the Snapshot [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully checks if the finalizer was removed from the warning Integration PipelineRun [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully merging the PR, expected to succeed  [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully leads to triggering a push PipelineRun [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully verifies that Push PipelineRuns completed [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully validates the Integration test scenario PipelineRun is reported to merge request CheckRuns, and it pass [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully eventually leads to the status reported at Checks tab for the failed Integration PipelineRun [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when The git-provider annotation is missing should set the git-reporting-failure annotation correctly [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when build pipelinerun fails build pipelinerun is created but fails [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when build pipelinerun fails build pipelinerun failure is reported to integration test checkRun [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC happy path Post-release verification creates component from git source https://github.com/redhat-appstudio-qe/fbc-sample-repo-test [release-pipelines, fbc-release, fbcHappyPath]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC happy path Post-release verification Creates a push snapshot for a release [release-pipelines, fbc-release, fbcHappyPath]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC happy path Post-release verification verifies the fbc release pipelinerun is running and succeeds [release-pipelines, fbc-release, fbcHappyPath]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC happy path Post-release verification verifies release CR completed and set succeeded. [release-pipelines, fbc-release, fbcHappyPath]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC Staged Index Post-release verification creates component from git source https://github.com/redhat-appstudio-qe/fbc-sample-repo-test [release-pipelines, fbc-release, fbcStagedIndex]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC Staged Index Post-release verification Creates a push snapshot for a release [release-pipelines, fbc-release, fbcStagedIndex]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC Staged Index Post-release verification verifies the fbc release pipelinerun is running and succeeds [release-pipelines, fbc-release, fbcStagedIndex]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC Staged Index Post-release verification verifies release CR completed and set succeeded. [release-pipelines, fbc-release, fbcStagedIndex]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC hotfix process FBC hotfix post-release verification creates component from git source https://github.com/redhat-appstudio-qe/fbc-sample-repo-test [release-pipelines, fbc-release, fbcHotfix]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC hotfix process FBC hotfix post-release verification Creates a push snapshot for a release [release-pipelines, fbc-release, fbcHotfix]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC hotfix process FBC hotfix post-release verification verifies the fbc release pipelinerun is running and succeeds [release-pipelines, fbc-release, fbcHotfix]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC hotfix process FBC hotfix post-release verification verifies release CR completed and set succeeded. [release-pipelines, fbc-release, fbcHotfix]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC pre-GA process FBC pre-GA post-release verification creates component from git source https://github.com/redhat-appstudio-qe/fbc-sample-repo-test [release-pipelines, fbc-release, fbcPreGA]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC pre-GA process FBC pre-GA post-release verification Creates a push snapshot for a release [release-pipelines, fbc-release, fbcPreGA]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC pre-GA process FBC pre-GA post-release verification verifies the fbc release pipelinerun is running and succeeds [release-pipelines, fbc-release, fbcPreGA]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC pre-GA process FBC pre-GA post-release verification verifies release CR completed and set succeeded. [release-pipelines, fbc-release, fbcPreGA]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws host-pool allocation when the Component with multi-platform-build is created a PipelineRun is triggered [multi-platform, aws-host-pool]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws host-pool allocation when the Component with multi-platform-build is created the build-container task from component pipelinerun is buildah-remote [multi-platform, aws-host-pool]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws host-pool allocation when the Component with multi-platform-build is created The multi platform secret is populated [multi-platform, aws-host-pool]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws host-pool allocation when the Component with multi-platform-build is created that PipelineRun completes successfully [multi-platform, aws-host-pool]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws host-pool allocation when the Component with multi-platform-build is created test that cleanup happened successfully [multi-platform, aws-host-pool]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws dynamic allocation when the Component with multi-platform-build is created a PipelineRun is triggered [multi-platform, aws-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws dynamic allocation when the Component with multi-platform-build is created the build-container task from component pipelinerun is buildah-remote [multi-platform, aws-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws dynamic allocation when the Component with multi-platform-build is created The multi platform secret is populated [multi-platform, aws-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws dynamic allocation when the Component with multi-platform-build is created that PipelineRun completes successfully [multi-platform, aws-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws dynamic allocation when the Component with multi-platform-build is created check cleanup happened successfully [multi-platform, aws-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm system z dynamic allocation when the Component with multi-platform-build is created a PipelineRun is triggered [multi-platform, ibmz-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm system z dynamic allocation when the Component with multi-platform-build is created the build-container task from component pipelinerun is buildah-remote [multi-platform, ibmz-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm system z dynamic allocation when the Component with multi-platform-build is created The multi platform secret is populated [multi-platform, ibmz-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm system z dynamic allocation when the Component with multi-platform-build is created that PipelineRun completes successfully [multi-platform, ibmz-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm system z dynamic allocation when the Component with multi-platform-build is created check cleanup happened successfully [multi-platform, ibmz-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm power pc dynamic allocation when the Component with multi-platform-build is created a PipelineRun is triggered [multi-platform, ibmp-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm power pc dynamic allocation when the Component with multi-platform-build is created the build-container task from component pipelinerun is buildah-remote [multi-platform, ibmp-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm power pc dynamic allocation when the Component with multi-platform-build is created The multi platform secret is populated [multi-platform, ibmp-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm power pc dynamic allocation when the Component with multi-platform-build is created that PipelineRun completes successfully [multi-platform, ibmp-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm power pc dynamic allocation when the Component with multi-platform-build is created check cleanup happened successfully [multi-platform, ibmp-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when a new Component is created triggers a build PipelineRun [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when a new Component is created verifies if the build PipelineRun contains the finalizer [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when a new Component is created waits for build PipelineRun to succeed [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when a new Component is created should have a related PaC init PR created [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when the build pipelineRun run succeeded checks if the BuildPipelineRun have the annotation of chains signed [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when the build pipelineRun run succeeded checks if the Snapshot is created [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when the build pipelineRun run succeeded checks if the Build PipelineRun got annotated with Snapshot name [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when the build pipelineRun run succeeded verifies that the finalizer has been removed from the build pipelinerun [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when the build pipelineRun run succeeded checks if all of the integrationPipelineRuns passed [integration-service, slow]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when the build pipelineRun run succeeded checks if the passed status of integration test is reported in the Snapshot [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when the build pipelineRun run succeeded checks if the skipped integration test is absent from the Snapshot&#39;s status annotation [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when the build pipelineRun run succeeded checks if the finalizer was removed from all of the related Integration pipelineRuns [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service creates a ReleasePlan [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service creates an snapshot of push event [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when An snapshot of push event is created checks if the global candidate is updated after push event [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when An snapshot of push event is created checks if all of the integrationPipelineRuns created by push event passed [integration-service, slow]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when An snapshot of push event is created checks if a Release is created successfully [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail triggers a build PipelineRun [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail should have a related PaC init PR created [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail checks if the BuildPipelineRun have the annotation of chains signed [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail checks if the Snapshot is created [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail checks if the Build PipelineRun got annotated with Snapshot name [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail checks if all of the integrationPipelineRuns finished [integration-service, slow]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail checks if the failed status of integration test is reported in the Snapshot [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail checks if the skipped integration test is absent from the Snapshot&#39;s status annotation [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail checks if snapshot is marked as failed [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail checks if the finalizer was removed from all of the related Integration pipelineRuns [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail creates a new IntegrationTestScenario [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail updates the Snapshot with the re-run label for the new scenario [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail when An snapshot is updated with a re-run label for a given scenario checks if the new integration pipelineRun started [integration-service, slow]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail when An snapshot is updated with a re-run label for a given scenario checks if the re-run label was removed from the Snapshot [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail when An snapshot is updated with a re-run label for a given scenario checks if all integration pipelineRuns finished successfully [integration-service, slow]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail when An snapshot is updated with a re-run label for a given scenario checks if the name of the re-triggered pipelinerun is reported in the Snapshot [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail when An snapshot is updated with a re-run label for a given scenario checks if snapshot is still marked as failed [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail creates an snapshot of push event [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail when An snapshot of push event is created checks no Release CRs are created [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component A creates the Component A successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component A triggers a Build PipelineRun for componentA go-component [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component A does not contain an annotation with a Snapshot Name [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component A should lead to build PipelineRunA finishing successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component A should lead to a PaC PR creation for componentA go-component [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLRA is finished successfully checks if the Snapshot is created [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLRA is finished successfully should find the related Integration PipelineRuns [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLRA is finished successfully integration pipeline should end up with success [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Snapshot testing is completed successfully should merge the init PaC PR successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component B creates the Component B successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component B triggers a Build PipelineRun for component python-component [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component B does not contain an annotation with a Snapshot Name [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component B should lead to build PipelineRun finishing successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component B should lead to a PaC PR creation for component python-component [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLR is finished successfully checks if the Snapshot is created [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLR is finished successfully should find the related Integration PipelineRuns [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLR is finished successfully integration pipeline should end up with success [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Snapshot testing is completed successfully should merge the init PaC PR successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component C creates the Component C successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component C triggers a Build PipelineRun for componentC konflux-test-integration-clone [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component C does not contain an annotation with a Snapshot Name [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component C should lead to build PipelineRun finishing successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component C should lead to a PaC PR creation for componentC konflux-test-integration-clone [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLR is finished successfully checks if the Snapshot is created [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLR is finished successfully should find the related Integration PipelineRuns [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLR is finished successfully integration pipeline should end up with success [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Snapshot testing is completed successfully should merge the init PaC PR successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when both the init PaC PRs are merged should make change to the root folder [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when both the init PaC PRs are merged should make change to the multiple-repo [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when both the init PaC PRs are merged wait for the last components build to finish [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when both the init PaC PRs are merged wait for all component snapshots to be created with proper PR group annotations [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when both the init PaC PRs are merged get all group snapshots and check if pr-group annotation contains all components [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when both the init PaC PRs are merged make sure that group snapshot contains last build pipelinerun for each component [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when Older snapshot and integration pipelinerun should be cancelled once new snapshot is created make change to the multiple-repo to trigger a new cycle of testing [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when Older snapshot and integration pipelinerun should be cancelled once new snapshot is created wait for the components A and B build to finish [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when Older snapshot and integration pipelinerun should be cancelled once new snapshot is created get all component snapshots for component A and check if older snapshot has been cancelled [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when Older snapshot and integration pipelinerun should be cancelled once new snapshot is created get all group snapshots and check if older group snapshot is cancelled [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when ResolutionRequest is deleted after pipeline completes verifies that ResolutionRequest is deleted after pipeline resolution [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when ResolutionRequest is deleted after pipeline completes verifies that no orphaned ResolutionRequests remain in namespace after test completion [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when IntegrationTestScenario reference to task as pipelinerun resolution trigger pipelinerun for invalid integrationTestScenario by annotating snapshot and verify failing to create integration pipelinerun [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build annotations when component is created with invalid build request annotations handles invalid request annotation [build-service, github, annotations]" classname="Red Hat App Studio E2E tests" status="passed" time="71.928118877">
              <system-err>&gt; Enter [BeforeAll] test build annotations - /tmp/tmp.O2kCCFO8V9/tests/build/annotations.go:35 @ 05/02/26 05:06:21.891&#xA;&lt; Exit [BeforeAll] test build annotations - /tmp/tmp.O2kCCFO8V9/tests/build/annotations.go:35 @ 05/02/26 05:06:23.302 (1.411s)&#xA;&gt; Enter [BeforeAll] when component is created with invalid build request annotations - /tmp/tmp.O2kCCFO8V9/tests/build/annotations.go:69 @ 05/02/26 05:06:23.302&#xA;&lt; Exit [BeforeAll] when component is created with invalid build request annotations - /tmp/tmp.O2kCCFO8V9/tests/build/annotations.go:69 @ 05/02/26 05:06:33.429 (10.127s)&#xA;&gt; Enter [It] handles invalid request annotation - /tmp/tmp.O2kCCFO8V9/tests/build/annotations.go:89 @ 05/02/26 05:06:33.429&#xA;build status annotation value: {&#34;message&#34;:&#34;unexpected build request: foo&#34;}&#xA;&lt; Exit [It] handles invalid request annotation - /tmp/tmp.O2kCCFO8V9/tests/build/annotations.go:89 @ 05/02/26 05:07:33.493 (1m0.064s)&#xA;&gt; Enter [AfterAll] test build annotations - /tmp/tmp.O2kCCFO8V9/tests/build/annotations.go:51 @ 05/02/26 05:07:33.494&#xA;&lt; Exit [AfterAll] test build annotations - /tmp/tmp.O2kCCFO8V9/tests/build/annotations.go:51 @ 05/02/26 05:07:33.818 (324ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/annotations.go:24 @ 05/02/26 05:07:33.818&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/annotations.go:24 @ 05/02/26 05:07:33.818 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite Release service tenant pipeline] Post-release verification verifies that a Release CR should have been created in the dev namespace [release-service, tenant]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite Release service tenant pipeline] Post-release verification verifies that Tenant PipelineRun is triggered [release-service, tenant]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite Release service tenant pipeline] Post-release verification verifies that a Release is marked as succeeded. [release-service, tenant]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created creates first component [build-service, github, pac-build, secret-lookup]" classname="Red Hat App Studio E2E tests" status="passed" time="12.903531717">
              <system-err>&gt; Enter [BeforeAll] test build secret lookup - /tmp/tmp.O2kCCFO8V9/tests/build/secret_lookup.go:32 @ 05/02/26 05:06:21.887&#xA;&lt; Exit [BeforeAll] test build secret lookup - /tmp/tmp.O2kCCFO8V9/tests/build/secret_lookup.go:32 @ 05/02/26 05:06:24.508 (2.621s)&#xA;&gt; Enter [BeforeAll] when two secrets are created - /tmp/tmp.O2kCCFO8V9/tests/build/secret_lookup.go:100 @ 05/02/26 05:06:24.508&#xA;&lt; Exit [BeforeAll] when two secrets are created - /tmp/tmp.O2kCCFO8V9/tests/build/secret_lookup.go:100 @ 05/02/26 05:06:24.648 (140ms)&#xA;&gt; Enter [It] creates first component - /tmp/tmp.O2kCCFO8V9/tests/build/secret_lookup.go:123 @ 05/02/26 05:06:24.649&#xA;Image repository for component component-one-ixyn in namespace build-e2e-bdei do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [It] creates first component - /tmp/tmp.O2kCCFO8V9/tests/build/secret_lookup.go:123 @ 05/02/26 05:06:34.789 (10.14s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/secret_lookup.go:25 @ 05/02/26 05:06:34.789&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/secret_lookup.go:25 @ 05/02/26 05:06:34.789 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created creates second component [build-service, github, pac-build, secret-lookup]" classname="Red Hat App Studio E2E tests" status="passed" time="20.1964203">
              <system-err>&gt; Enter [It] creates second component - /tmp/tmp.O2kCCFO8V9/tests/build/secret_lookup.go:140 @ 05/02/26 05:06:34.789&#xA;Image repository for component component-two-rklp in namespace build-e2e-bdei do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component component-two-rklp in namespace build-e2e-bdei do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [It] creates second component - /tmp/tmp.O2kCCFO8V9/tests/build/secret_lookup.go:140 @ 05/02/26 05:06:54.986 (20.196s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/secret_lookup.go:25 @ 05/02/26 05:06:54.986&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/secret_lookup.go:25 @ 05/02/26 05:06:54.986 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created check first component annotation has errors [build-service, github, pac-build, secret-lookup]" classname="Red Hat App Studio E2E tests" status="passed" time="5.135355271">
              <system-err>&gt; Enter [It] check first component annotation has errors - /tmp/tmp.O2kCCFO8V9/tests/build/secret_lookup.go:158 @ 05/02/26 05:06:54.987&#xA;build status annotation value: {&#34;message&#34;:&#34;waiting for spec.containerImage to be set by ImageRepository with annotation image-controller.appstudio.redhat.com/update-component-image&#34;}&#xA;build status annotation value: {&#34;pac&#34;:{&#34;state&#34;:&#34;error&#34;,&#34;error-id&#34;:74,&#34;error-message&#34;:&#34;74: Access token is unrecognizable by GitHub&#34;},&#34;message&#34;:&#34;done&#34;}&#xA;&lt; Exit [It] check first component annotation has errors - /tmp/tmp.O2kCCFO8V9/tests/build/secret_lookup.go:158 @ 05/02/26 05:07:00.122 (5.135s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/secret_lookup.go:25 @ 05/02/26 05:07:00.122&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/secret_lookup.go:25 @ 05/02/26 05:07:00.122 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created triggered PipelineRun is for component  [build-service, github, pac-build, secret-lookup]" classname="Red Hat App Studio E2E tests" status="passed" time="60.370116252">
              <system-err>&gt; Enter [It] triggered PipelineRun is for component  - /tmp/tmp.O2kCCFO8V9/tests/build/secret_lookup.go:178 @ 05/02/26 05:07:00.123&#xA;PipelineRun has not been created yet for the component build-e2e-bdei/component-two-rklp&#xA;PipelineRun has not been created yet for the component build-e2e-bdei/component-two-rklp&#xA;PipelineRun has not been created yet for the component build-e2e-bdei/component-two-rklp&#xA;&lt; Exit [It] triggered PipelineRun is for component  - /tmp/tmp.O2kCCFO8V9/tests/build/secret_lookup.go:178 @ 05/02/26 05:08:00.489 (1m0.367s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/secret_lookup.go:25 @ 05/02/26 05:08:00.493&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/secret_lookup.go:25 @ 05/02/26 05:08:00.493 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created check only one pipelinerun should be triggered [build-service, github, pac-build, secret-lookup]" classname="Red Hat App Studio E2E tests" status="passed" time="121.590405861">
              <system-err>&gt; Enter [It] check only one pipelinerun should be triggered - /tmp/tmp.O2kCCFO8V9/tests/build/secret_lookup.go:193 @ 05/02/26 05:08:00.493&#xA;&lt; Exit [It] check only one pipelinerun should be triggered - /tmp/tmp.O2kCCFO8V9/tests/build/secret_lookup.go:193 @ 05/02/26 05:10:00.494 (2m0s)&#xA;&gt; Enter [AfterAll] test build secret lookup - /tmp/tmp.O2kCCFO8V9/tests/build/secret_lookup.go:61 @ 05/02/26 05:10:00.494&#xA;&lt; Exit [AfterAll] test build secret lookup - /tmp/tmp.O2kCCFO8V9/tests/build/secret_lookup.go:61 @ 05/02/26 05:10:02.083 (1.589s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/secret_lookup.go:25 @ 05/02/26 05:10:02.084&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/secret_lookup.go:25 @ 05/02/26 05:10:02.084 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created when second component is deleted, pac pr branch should not exist in the repo [build-service, github, pac-build, secret-lookup]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite [HACBS-1571]test-release-e2e-push-image-to-pyxis] Post-release verification tests that Release CR is created for the Snapshot [release-pipelines, rh-push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite [HACBS-1571]test-release-e2e-push-image-to-pyxis] Post-release verification verifies a release PipelineRun is started and succeeded in managed namespace [release-pipelines, rh-push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite [HACBS-1571]test-release-e2e-push-image-to-pyxis] Post-release verification validate the result of task create-pyxis-image contains image ids [release-pipelines, rh-push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite [HACBS-1571]test-release-e2e-push-image-to-pyxis] Post-release verification tests that Release CR has completed [release-pipelines, rh-push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite [HACBS-1571]test-release-e2e-push-image-to-pyxis] Post-release verification validates that imageIds from task create-pyxis-image exist in Pyxis. [release-pipelines, rh-push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private correctly targets the default branch (that is not named &#39;main&#39;) with PaC [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="52.63962514">
              <system-err>&gt; Enter [BeforeAll] PaC component build - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:54 @ 05/02/26 05:06:21.685&#xA;&lt; Exit [BeforeAll] PaC component build - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:54 @ 05/02/26 05:06:28.038 (6.353s)&#xA;&gt; Enter [BeforeAll] when a new component without specified branch is created and with visibility private - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:117 @ 05/02/26 05:06:28.038&#xA;Image repository for component fj-test-custom-default-ahoync in namespace build-e2e-spsb do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component fj-test-custom-default-ahoync in namespace build-e2e-spsb do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [BeforeAll] when a new component without specified branch is created and with visibility private - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:117 @ 05/02/26 05:06:48.171 (20.133s)&#xA;&gt; Enter [It] correctly targets the default branch (that is not named &#39;main&#39;) with PaC - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:136 @ 05/02/26 05:06:48.171&#xA;&lt; Exit [It] correctly targets the default branch (that is not named &#39;main&#39;) with PaC - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:136 @ 05/02/26 05:07:14.324 (26.153s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:07:14.324&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:07:14.324 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private workspace parameter is set correctly in PaC repository CR [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.126173561">
              <system-err>&gt; Enter [It] workspace parameter is set correctly in PaC repository CR - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:153 @ 05/02/26 05:07:14.324&#xA;&lt; Exit [It] workspace parameter is set correctly in PaC repository CR - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:153 @ 05/02/26 05:07:14.45 (126ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:07:14.45&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:07:14.45 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="20.254601692">
              <system-err>&gt; Enter [It] triggers a PipelineRun - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:176 @ 05/02/26 05:07:14.451&#xA;PipelineRun has not been created yet for the component build-e2e-spsb/fj-test-custom-branch-hnnsvz&#xA;&lt; Exit [It] triggers a PipelineRun - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:176 @ 05/02/26 05:07:34.705 (20.254s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:07:34.705&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:07:34.705 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private build pipeline uses the correct serviceAccount [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.000313911">
              <system-err>&gt; Enter [It] build pipeline uses the correct serviceAccount - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:191 @ 05/02/26 05:07:34.706&#xA;&lt; Exit [It] build pipeline uses the correct serviceAccount - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:191 @ 05/02/26 05:07:34.706 (0s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:07:34.706&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:07:34.706 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private component build status is set correctly [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.063353286">
              <system-err>&gt; Enter [It] component build status is set correctly - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:195 @ 05/02/26 05:07:34.707&#xA;build status annotation value: {&#34;pac&#34;:{&#34;state&#34;:&#34;enabled&#34;,&#34;merge-url&#34;:&#34;https://codeberg.org/konflux-qe/devfile-sample-hello-world-ssljbt/pulls/1&#34;,&#34;configuration-time&#34;:&#34;Sat, 02 May 2026 05:07:13 UTC&#34;},&#34;message&#34;:&#34;done&#34;}&#xA;state: enabled&#xA;mergeUrl: https://codeberg.org/konflux-qe/devfile-sample-hello-world-ssljbt/pulls/1&#xA;errId: 0&#xA;errMessage: &#xA;configurationTime: Sat, 02 May 2026 05:07:13 UTC&#xA;&lt; Exit [It] component build status is set correctly - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:195 @ 05/02/26 05:07:34.77 (63ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:07:34.77&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:07:34.77 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="1.066815984">
              <system-err>&gt; Enter [It] image repo and robot account created successfully - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:225 @ 05/02/26 05:07:34.77&#xA;&lt; Exit [It] image repo and robot account created successfully - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:225 @ 05/02/26 05:07:35.837 (1.066s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:07:35.837&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:07:35.837 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private created image repo is private [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.281009947">
              <system-err>&gt; Enter [It] created image repo is private - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:243 @ 05/02/26 05:07:35.837&#xA;&lt; Exit [It] created image repo is private - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:243 @ 05/02/26 05:07:36.118 (281ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:07:36.118&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:07:36.118 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private a related PipelineRun should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="41.768063733">
              <system-err>&gt; Enter [It] a related PipelineRun should be deleted after deleting the component - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:249 @ 05/02/26 05:07:36.119&#xA;&lt; Exit [It] a related PipelineRun should be deleted after deleting the component - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:249 @ 05/02/26 05:08:17.887 (41.768s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:17.887&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:17.887 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private PR branch should not exist in the repo [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.143811233">
              <system-err>&gt; Enter [It] PR branch should not exist in the repo - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:265 @ 05/02/26 05:08:17.887&#xA;&lt; Exit [It] PR branch should not exist in the repo - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:265 @ 05/02/26 05:08:18.031 (143ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:18.031&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:18.031 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private related image repo and the robot account should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.861350738">
              <system-err>&gt; Enter [It] related image repo and the robot account should be deleted after deleting the component - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:278 @ 05/02/26 05:08:18.031&#xA;&lt; Exit [It] related image repo and the robot account should be deleted after deleting the component - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:278 @ 05/02/26 05:08:18.892 (861ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:18.893&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:18.893 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="30.320254126">
              <system-err>&gt; Enter [BeforeAll] when a new Component with specified custom branch is created - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:306 @ 05/02/26 05:08:18.894&#xA;Image repository for component fj-test-custom-branch-hnnsvz in namespace build-e2e-spsb do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [BeforeAll] when a new Component with specified custom branch is created - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:306 @ 05/02/26 05:08:29.023 (10.13s)&#xA;&gt; Enter [It] triggers a PipelineRun - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:332 @ 05/02/26 05:08:29.023&#xA;PipelineRun has not been created yet for the component build-e2e-spsb/fj-test-custom-branch-hnnsvz&#xA;&lt; Exit [It] triggers a PipelineRun - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:332 @ 05/02/26 05:08:49.213 (20.19s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:49.214&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:49.214 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created should lead to a PaC init PR creation [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.20530075">
              <system-err>&gt; Enter [It] should lead to a PaC init PR creation - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:347 @ 05/02/26 05:08:49.214&#xA;&lt; Exit [It] should lead to a PaC init PR creation - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:347 @ 05/02/26 05:08:49.419 (205ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:49.419&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:49.419 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created the PipelineRun should eventually finish successfully [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="540.273677201">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:365 @ 05/02/26 05:08:49.42&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-frbjn found for Component build-e2e-spsb/fj-test-custom-branch-hnnsvz&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-frbjn reason: ResolvingTaskRef&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-frbjn reason: ResolvingTaskRef&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-frbjn reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-frbjn reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-frbjn reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-frbjn reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-frbjn reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-frbjn reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-frbjn reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-frbjn reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-frbjn reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-frbjn reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-frbjn reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-frbjn reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-frbjn reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-frbjn reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-frbjn reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-frbjn reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-frbjn reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-frbjn reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-frbjn reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-frbjn reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-frbjn reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-frbjn reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-frbjn reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-frbjn reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-frbjn reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-frbjn reason: Succeeded&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:365 @ 05/02/26 05:17:49.693 (9m0.273s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:17:49.693&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:17:49.693 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="1.265485437">
              <system-err>&gt; Enter [It] image repo and robot account created successfully - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:371 @ 05/02/26 05:17:49.694&#xA;&lt; Exit [It] image repo and robot account created successfully - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:371 @ 05/02/26 05:17:50.959 (1.265s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:17:50.959&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:17:50.959 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created created image repo is public [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.30889711">
              <system-err>&gt; Enter [It] created image repo is public - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:390 @ 05/02/26 05:17:50.96&#xA;&lt; Exit [It] created image repo is public - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:390 @ 05/02/26 05:17:51.268 (309ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:17:51.268&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:17:51.269 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created image tag is updated successfully [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.41469077">
              <system-err>&gt; Enter [It] image tag is updated successfully - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:396 @ 05/02/26 05:17:51.269&#xA;Image tag quay.io/redhat-appstudio-qe/build-e2e-spsb/fj-test-custom-branch-hnnsvz:on-pr-be89fa4870f213273cbbca872b4efe1bed9a75cd successfully found in Quay&#xA;&lt; Exit [It] image tag is updated successfully - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:396 @ 05/02/26 05:17:51.683 (414ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:17:51.683&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:17:51.684 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created should ensure pruning labels are set [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.700654201">
              <system-err>&gt; Enter [It] should ensure pruning labels are set - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:425 @ 05/02/26 05:17:51.684&#xA;&lt; Exit [It] should ensure pruning labels are set - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:425 @ 05/02/26 05:17:52.384 (700ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:17:52.385&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:17:52.385 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created eventually leads to the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.604804539">
              <system-err>&gt; Enter [It] eventually leads to the PipelineRun status report at Checks tab - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:439 @ 05/02/26 05:17:52.385&#xA;&lt; Exit [It] eventually leads to the PipelineRun status report at Checks tab - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:439 @ 05/02/26 05:17:52.385 (0s)&#xA;&gt; Enter [AfterAll] when a new Component with specified custom branch is created - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:324 @ 05/02/26 05:17:52.385&#xA;&lt; Exit [AfterAll] when a new Component with specified custom branch is created - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:324 @ 05/02/26 05:17:52.99 (604ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:17:52.99&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:17:52.99 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is updated eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="21.691685613">
              <system-err>&gt; Enter [BeforeAll] when the PaC init branch is updated - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:454 @ 05/02/26 05:17:52.99&#xA;created file sha: 0993a0f359752ab85adcfdd98170eddbb69cea1e&#xA;&lt; Exit [BeforeAll] when the PaC init branch is updated - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:454 @ 05/02/26 05:17:54.492 (1.502s)&#xA;&gt; Enter [It] eventually leads to triggering another PipelineRun - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:464 @ 05/02/26 05:17:54.493&#xA;PipelineRun has not been created yet for the component build-e2e-spsb/fj-test-custom-branch-hnnsvz&#xA;&lt; Exit [It] eventually leads to triggering another PipelineRun - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:464 @ 05/02/26 05:18:14.682 (20.189s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:18:14.682&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:18:14.682 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is updated should lead to a PaC init PR update [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.205975591">
              <system-err>&gt; Enter [It] should lead to a PaC init PR update - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:479 @ 05/02/26 05:18:14.682&#xA;&lt; Exit [It] should lead to a PaC init PR update - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:479 @ 05/02/26 05:18:14.888 (206ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:18:14.888&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:18:14.888 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is updated PipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="300.134641131">
              <system-err>&gt; Enter [It] PipelineRun should eventually finish - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:498 @ 05/02/26 05:18:14.889&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-wnf4f found for Component build-e2e-spsb/fj-test-custom-branch-hnnsvz&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-wnf4f reason: ResolvingTaskRef&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-wnf4f reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-wnf4f reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-wnf4f reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-wnf4f reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-wnf4f reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-wnf4f reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-wnf4f reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-wnf4f reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-wnf4f reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-wnf4f reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-wnf4f reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-wnf4f reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-wnf4f reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-wnf4f reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-pull-request-wnf4f reason: Succeeded&#xA;&lt; Exit [It] PipelineRun should eventually finish - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:498 @ 05/02/26 05:23:15.023 (5m0.134s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:23:15.023&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:23:15.023 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is updated eventually leads to another update of a PR about the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.00029419">
              <system-err>&gt; Enter [It] eventually leads to another update of a PR about the PipelineRun status report at Checks tab - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:504 @ 05/02/26 05:23:15.024&#xA;&lt; Exit [It] eventually leads to another update of a PR about the PipelineRun status report at Checks tab - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:504 @ 05/02/26 05:23:15.024 (0s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:23:15.024&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:23:15.024 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="23.361412957">
              <system-err>&gt; Enter [BeforeAll] when the PaC init branch is merged - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:520 @ 05/02/26 05:23:15.024&#xA;merged result sha: acb422e7da3688b384b9e87b3f15f5b9e9b13f8d&#xA;&lt; Exit [BeforeAll] when the PaC init branch is merged - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:520 @ 05/02/26 05:23:18.184 (3.159s)&#xA;&gt; Enter [It] eventually leads to triggering another PipelineRun - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:530 @ 05/02/26 05:23:18.184&#xA;PipelineRun has not been created yet for the component build-e2e-spsb/fj-test-custom-branch-hnnsvz&#xA;&lt; Exit [It] eventually leads to triggering another PipelineRun - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:530 @ 05/02/26 05:23:38.385 (20.202s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:23:38.386&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:23:38.386 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="480.524222728">
              <system-err>&gt; Enter [It] pipelineRun should eventually finish - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:546 @ 05/02/26 05:23:38.386&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-push-wc82v found for Component build-e2e-spsb/fj-test-custom-branch-hnnsvz&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-push-wc82v reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-push-wc82v reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-push-wc82v reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-push-wc82v reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-push-wc82v reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-push-wc82v reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-push-wc82v reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-push-wc82v reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-push-wc82v reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-push-wc82v reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-push-wc82v reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-push-wc82v reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-push-wc82v reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-push-wc82v reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-push-wc82v reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-push-wc82v reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-push-wc82v reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-push-wc82v reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-push-wc82v reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-push-wc82v reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-push-wc82v reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-push-wc82v reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-push-wc82v reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-push-wc82v reason: Running&#xA;PipelineRun fj-test-custom-branch-hnnsvz-on-push-wc82v reason: Succeeded&#xA;&lt; Exit [It] pipelineRun should eventually finish - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:546 @ 05/02/26 05:31:38.91 (8m0.524s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:31:38.91&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:31:38.91 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged does not have expiration set [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.391497722">
              <system-err>&gt; Enter [It] does not have expiration set - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:552 @ 05/02/26 05:31:38.911&#xA;&lt; Exit [It] does not have expiration set - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:552 @ 05/02/26 05:31:39.302 (391ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:31:39.302&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:31:39.302 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged After updating image visibility to private, it should not trigger another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="128.466905414">
              <system-err>&gt; Enter [It] After updating image visibility to private, it should not trigger another PipelineRun - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:564 @ 05/02/26 05:31:39.303&#xA;found pipelinerun: fj-test-custom-branch-hnnsvz-on-push-wc82v&#xA;waiting for one minute and expecting to not trigger a PipelineRun&#xA;&lt; Exit [It] After updating image visibility to private, it should not trigger another PipelineRun - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:564 @ 05/02/26 05:33:47.769 (2m8.467s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:33:47.769&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:33:47.769 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged image repo is updated to private [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.372245092">
              <system-err>&gt; Enter [It] image repo is updated to private - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:595 @ 05/02/26 05:33:47.77&#xA;&lt; Exit [It] image repo is updated to private - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:595 @ 05/02/26 05:33:48.142 (372ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:33:48.142&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:33:48.142 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged retrigger the pipeline manually [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged retriggered pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the component is removed related image repo and robot accounts deleted [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="11.932436554">
              <system-err>&gt; Enter [BeforeAll] when the component is removed - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:649 @ 05/02/26 05:33:48.144&#xA;&lt; Exit [BeforeAll] when the component is removed - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:649 @ 05/02/26 05:33:53.914 (5.77s)&#xA;&gt; Enter [It] related image repo and robot accounts deleted - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:661 @ 05/02/26 05:33:53.914&#xA;&lt; Exit [It] related image repo and robot accounts deleted - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:661 @ 05/02/26 05:34:00.075 (6.161s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:34:00.076&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:34:00.076 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the component is removed purge PR is created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="7.829966227">
              <system-err>&gt; Enter [It] purge PR is created successfully - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:679 @ 05/02/26 05:34:00.076&#xA;Found purge PR with id: 3&#xA;&lt; Exit [It] purge PR is created successfully - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:679 @ 05/02/26 05:34:00.542 (466ms)&#xA;&gt; Enter [AfterAll] PaC component build - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:101 @ 05/02/26 05:34:00.543&#xA;&lt; Exit [AfterAll] PaC component build - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:101 @ 05/02/26 05:34:07.906 (7.363s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:34:07.906&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:34:07.906 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for release-to-github pipeline] Release-to-github happy path Post-release verification verifies if release CR is created [release-pipelines, release-to-github, releaseToGithub]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for release-to-github pipeline] Release-to-github happy path Post-release verification verifies the release pipelinerun is running and succeeds [release-pipelines, release-to-github, releaseToGithub]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for release-to-github pipeline] Release-to-github happy path Post-release verification verifies release CR completed and set succeeded. [release-pipelines, release-to-github, releaseToGithub]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for release-to-github pipeline] Release-to-github happy path Post-release verification verifies if the Release exists in github repo [release-pipelines, release-to-github, releaseToGithub]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private correctly targets the default branch (that is not named &#39;main&#39;) with PaC [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="82.126880884">
              <system-err>&gt; Enter [BeforeAll] PaC component build - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:54 @ 05/02/26 05:06:21.686&#xA;&lt; Exit [BeforeAll] PaC component build - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:54 @ 05/02/26 05:06:36.806 (15.12s)&#xA;&gt; Enter [BeforeAll] when a new component without specified branch is created and with visibility private - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:117 @ 05/02/26 05:06:36.806&#xA;Image repository for component gl-test-custom-default-ehduxj in namespace build-e2e-aljs do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component gl-test-custom-default-ehduxj in namespace build-e2e-aljs do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component gl-test-custom-default-ehduxj in namespace build-e2e-aljs do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [BeforeAll] when a new component without specified branch is created and with visibility private - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:117 @ 05/02/26 05:07:07.813 (31.007s)&#xA;&gt; Enter [It] correctly targets the default branch (that is not named &#39;main&#39;) with PaC - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:136 @ 05/02/26 05:07:07.813&#xA;&lt; Exit [It] correctly targets the default branch (that is not named &#39;main&#39;) with PaC - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:136 @ 05/02/26 05:07:43.813 (36s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:07:43.813&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:07:43.813 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private workspace parameter is set correctly in PaC repository CR [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.135087955">
              <system-err>&gt; Enter [It] workspace parameter is set correctly in PaC repository CR - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:153 @ 05/02/26 05:07:43.813&#xA;&lt; Exit [It] workspace parameter is set correctly in PaC repository CR - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:153 @ 05/02/26 05:07:43.948 (135ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:07:43.948&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:07:43.948 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="20.205337741">
              <system-err>&gt; Enter [It] triggers a PipelineRun - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:176 @ 05/02/26 05:07:43.949&#xA;PipelineRun has not been created yet for the component build-e2e-aljs/gl-test-custom-branch-dgjivf&#xA;&lt; Exit [It] triggers a PipelineRun - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:176 @ 05/02/26 05:08:04.154 (20.205s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:04.154&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:04.154 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private build pipeline uses the correct serviceAccount [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.000324692">
              <system-err>&gt; Enter [It] build pipeline uses the correct serviceAccount - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:191 @ 05/02/26 05:08:04.155&#xA;&lt; Exit [It] build pipeline uses the correct serviceAccount - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:191 @ 05/02/26 05:08:04.155 (0s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:04.155&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:04.155 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private component build status is set correctly [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.068085213">
              <system-err>&gt; Enter [It] component build status is set correctly - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:195 @ 05/02/26 05:08:04.156&#xA;build status annotation value: {&#34;pac&#34;:{&#34;state&#34;:&#34;enabled&#34;,&#34;merge-url&#34;:&#34;https://gitlab.com/konflux-qe/devfile-sample-hello-world-mbkhva/-/merge_requests/1&#34;,&#34;configuration-time&#34;:&#34;Sat, 02 May 2026 05:07:43 UTC&#34;},&#34;message&#34;:&#34;done&#34;}&#xA;state: enabled&#xA;mergeUrl: https://gitlab.com/konflux-qe/devfile-sample-hello-world-mbkhva/-/merge_requests/1&#xA;errId: 0&#xA;errMessage: &#xA;configurationTime: Sat, 02 May 2026 05:07:43 UTC&#xA;&lt; Exit [It] component build status is set correctly - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:195 @ 05/02/26 05:08:04.223 (68ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:04.224&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:04.224 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="1.062061076">
              <system-err>&gt; Enter [It] image repo and robot account created successfully - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:225 @ 05/02/26 05:08:04.224&#xA;&lt; Exit [It] image repo and robot account created successfully - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:225 @ 05/02/26 05:08:05.286 (1.062s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:05.286&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:05.286 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private created image repo is private [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.274763593">
              <system-err>&gt; Enter [It] created image repo is private - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:243 @ 05/02/26 05:08:05.287&#xA;&lt; Exit [It] created image repo is private - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:243 @ 05/02/26 05:08:05.561 (274ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:05.561&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:05.561 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private a related PipelineRun should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="21.831859245">
              <system-err>&gt; Enter [It] a related PipelineRun should be deleted after deleting the component - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:249 @ 05/02/26 05:08:05.562&#xA;&lt; Exit [It] a related PipelineRun should be deleted after deleting the component - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:249 @ 05/02/26 05:08:27.393 (21.831s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:27.393&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:27.393 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private PR branch should not exist in the repo [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.133834403">
              <system-err>&gt; Enter [It] PR branch should not exist in the repo - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:265 @ 05/02/26 05:08:27.394&#xA;&lt; Exit [It] PR branch should not exist in the repo - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:265 @ 05/02/26 05:08:27.528 (133ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:27.528&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:27.528 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private related image repo and the robot account should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.859000827">
              <system-err>&gt; Enter [It] related image repo and the robot account should be deleted after deleting the component - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:278 @ 05/02/26 05:08:27.528&#xA;&lt; Exit [It] related image repo and the robot account should be deleted after deleting the component - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:278 @ 05/02/26 05:08:28.387 (859ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:28.387&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:28.387 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="30.340794063">
              <system-err>&gt; Enter [BeforeAll] when a new Component with specified custom branch is created - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:306 @ 05/02/26 05:08:28.388&#xA;Image repository for component gl-test-custom-branch-dgjivf in namespace build-e2e-aljs do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [BeforeAll] when a new Component with specified custom branch is created - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:306 @ 05/02/26 05:08:38.526 (10.138s)&#xA;&gt; Enter [It] triggers a PipelineRun - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:332 @ 05/02/26 05:08:38.526&#xA;PipelineRun has not been created yet for the component build-e2e-aljs/gl-test-custom-branch-dgjivf&#xA;&lt; Exit [It] triggers a PipelineRun - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:332 @ 05/02/26 05:08:58.728 (20.203s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:58.728&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:58.728 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created should lead to a PaC init PR creation [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.198735498">
              <system-err>&gt; Enter [It] should lead to a PaC init PR creation - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:347 @ 05/02/26 05:08:58.729&#xA;&lt; Exit [It] should lead to a PaC init PR creation - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:347 @ 05/02/26 05:08:58.927 (198ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:58.928&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:58.928 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created the PipelineRun should eventually finish successfully [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="540.135478016">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:365 @ 05/02/26 05:08:58.928&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-x2tlk found for Component build-e2e-aljs/gl-test-custom-branch-dgjivf&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-x2tlk reason: ResolvingTaskRef&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-x2tlk reason: ResolvingTaskRef&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-x2tlk reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-x2tlk reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-x2tlk reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-x2tlk reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-x2tlk reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-x2tlk reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-x2tlk reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-x2tlk reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-x2tlk reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-x2tlk reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-x2tlk reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-x2tlk reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-x2tlk reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-x2tlk reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-x2tlk reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-x2tlk reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-x2tlk reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-x2tlk reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-x2tlk reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-x2tlk reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-x2tlk reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-x2tlk reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-x2tlk reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-x2tlk reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-x2tlk reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-x2tlk reason: Succeeded&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:365 @ 05/02/26 05:17:59.063 (9m0.135s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:17:59.063&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:17:59.063 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="1.04792674">
              <system-err>&gt; Enter [It] image repo and robot account created successfully - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:371 @ 05/02/26 05:17:59.064&#xA;&lt; Exit [It] image repo and robot account created successfully - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:371 @ 05/02/26 05:18:00.112 (1.048s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:18:00.112&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:18:00.112 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created created image repo is public [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.276120453">
              <system-err>&gt; Enter [It] created image repo is public - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:390 @ 05/02/26 05:18:00.112&#xA;&lt; Exit [It] created image repo is public - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:390 @ 05/02/26 05:18:00.388 (276ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:18:00.388&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:18:00.388 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created image tag is updated successfully [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.482428425">
              <system-err>&gt; Enter [It] image tag is updated successfully - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:396 @ 05/02/26 05:18:00.389&#xA;Image tag quay.io/redhat-appstudio-qe/build-e2e-aljs/gl-test-custom-branch-dgjivf:on-pr-ec87afe636f77514636d2bcf6f285d3727bc27a8 successfully found in Quay&#xA;&lt; Exit [It] image tag is updated successfully - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:396 @ 05/02/26 05:18:00.871 (482ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:18:00.871&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:18:00.871 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created should ensure pruning labels are set [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.61480143">
              <system-err>&gt; Enter [It] should ensure pruning labels are set - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:425 @ 05/02/26 05:18:00.871&#xA;&lt; Exit [It] should ensure pruning labels are set - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:425 @ 05/02/26 05:18:01.486 (614ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:18:01.486&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:18:01.486 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created eventually leads to the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.604613068">
              <system-err>&gt; Enter [It] eventually leads to the PipelineRun status report at Checks tab - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:439 @ 05/02/26 05:18:01.487&#xA;&lt; Exit [It] eventually leads to the PipelineRun status report at Checks tab - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:439 @ 05/02/26 05:18:01.942 (455ms)&#xA;&gt; Enter [AfterAll] when a new Component with specified custom branch is created - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:324 @ 05/02/26 05:18:01.942&#xA;&lt; Exit [AfterAll] when a new Component with specified custom branch is created - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:324 @ 05/02/26 05:18:02.091 (149ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:18:02.091&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:18:02.091 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is updated eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="20.995675134">
              <system-err>&gt; Enter [BeforeAll] when the PaC init branch is updated - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:454 @ 05/02/26 05:18:02.092&#xA;created file sha: 1b86da3965526e1e874c536325044f64a8cf140b&#xA;&lt; Exit [BeforeAll] when the PaC init branch is updated - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:454 @ 05/02/26 05:18:02.885 (793ms)&#xA;&gt; Enter [It] eventually leads to triggering another PipelineRun - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:464 @ 05/02/26 05:18:02.885&#xA;PipelineRun has not been created yet for the component build-e2e-aljs/gl-test-custom-branch-dgjivf&#xA;&lt; Exit [It] eventually leads to triggering another PipelineRun - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:464 @ 05/02/26 05:18:23.087 (20.202s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:18:23.087&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:18:23.087 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is updated should lead to a PaC init PR update [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.178517439">
              <system-err>&gt; Enter [It] should lead to a PaC init PR update - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:479 @ 05/02/26 05:18:23.088&#xA;&lt; Exit [It] should lead to a PaC init PR update - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:479 @ 05/02/26 05:18:23.266 (178ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:18:23.266&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:18:23.266 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is updated PipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="300.142795701">
              <system-err>&gt; Enter [It] PipelineRun should eventually finish - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:498 @ 05/02/26 05:18:23.267&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-xwb4p found for Component build-e2e-aljs/gl-test-custom-branch-dgjivf&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-xwb4p reason: ResolvingTaskRef&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-xwb4p reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-xwb4p reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-xwb4p reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-xwb4p reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-xwb4p reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-xwb4p reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-xwb4p reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-xwb4p reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-xwb4p reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-xwb4p reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-xwb4p reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-xwb4p reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-xwb4p reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-xwb4p reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-pull-request-xwb4p reason: Succeeded&#xA;&lt; Exit [It] PipelineRun should eventually finish - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:498 @ 05/02/26 05:23:23.409 (5m0.142s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:23:23.409&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:23:23.409 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is updated eventually leads to another update of a PR about the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.323964052">
              <system-err>&gt; Enter [It] eventually leads to another update of a PR about the PipelineRun status report at Checks tab - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:504 @ 05/02/26 05:23:23.41&#xA;&lt; Exit [It] eventually leads to another update of a PR about the PipelineRun status report at Checks tab - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:504 @ 05/02/26 05:23:23.733 (324ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:23:23.734&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:23:23.734 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="22.455874407">
              <system-err>&gt; Enter [BeforeAll] when the PaC init branch is merged - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:520 @ 05/02/26 05:23:23.734&#xA;merged result sha: 96cf42d2baf2e53c1110d73e03b16dfdcc38aada&#xA;&lt; Exit [BeforeAll] when the PaC init branch is merged - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:520 @ 05/02/26 05:23:25.987 (2.253s)&#xA;&gt; Enter [It] eventually leads to triggering another PipelineRun - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:530 @ 05/02/26 05:23:25.987&#xA;PipelineRun has not been created yet for the component build-e2e-aljs/gl-test-custom-branch-dgjivf&#xA;&lt; Exit [It] eventually leads to triggering another PipelineRun - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:530 @ 05/02/26 05:23:46.19 (20.203s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:23:46.19&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:23:46.19 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="560.217256714">
              <system-err>&gt; Enter [It] pipelineRun should eventually finish - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:546 @ 05/02/26 05:23:46.19&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-push-bc2qg found for Component build-e2e-aljs/gl-test-custom-branch-dgjivf&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-push-bc2qg reason: ResolvingTaskRef&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-push-bc2qg reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-push-bc2qg reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-push-bc2qg reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-push-bc2qg reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-push-bc2qg reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-push-bc2qg reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-push-bc2qg reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-push-bc2qg reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-push-bc2qg reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-push-bc2qg reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-push-bc2qg reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-push-bc2qg reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-push-bc2qg reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-push-bc2qg reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-push-bc2qg reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-push-bc2qg reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-push-bc2qg reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-push-bc2qg reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-push-bc2qg reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-push-bc2qg reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-push-bc2qg reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-push-bc2qg reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-push-bc2qg reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-push-bc2qg reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-push-bc2qg reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-push-bc2qg reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-push-bc2qg reason: Running&#xA;PipelineRun gl-test-custom-branch-dgjivf-on-push-bc2qg reason: Succeeded&#xA;&lt; Exit [It] pipelineRun should eventually finish - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:546 @ 05/02/26 05:33:06.407 (9m20.217s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:33:06.407&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:33:06.407 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged does not have expiration set [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.328004746">
              <system-err>&gt; Enter [It] does not have expiration set - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:552 @ 05/02/26 05:33:06.408&#xA;&lt; Exit [It] does not have expiration set - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:552 @ 05/02/26 05:33:06.736 (328ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:33:06.736&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:33:06.736 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged After updating image visibility to private, it should not trigger another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="128.579848118">
              <system-err>&gt; Enter [It] After updating image visibility to private, it should not trigger another PipelineRun - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:564 @ 05/02/26 05:33:06.736&#xA;found pipelinerun: gl-test-custom-branch-dgjivf-on-push-bc2qg&#xA;waiting for one minute and expecting to not trigger a PipelineRun&#xA;&lt; Exit [It] After updating image visibility to private, it should not trigger another PipelineRun - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:564 @ 05/02/26 05:35:15.316 (2m8.58s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:35:15.316&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:35:15.316 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged image repo is updated to private [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.336840701">
              <system-err>&gt; Enter [It] image repo is updated to private - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:595 @ 05/02/26 05:35:15.317&#xA;&lt; Exit [It] image repo is updated to private - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:595 @ 05/02/26 05:35:15.653 (336ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:35:15.653&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:35:15.654 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged retrigger the pipeline manually [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged retriggered pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the component is removed related image repo and robot accounts deleted [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="14.077489269">
              <system-err>&gt; Enter [BeforeAll] when the component is removed - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:649 @ 05/02/26 05:35:15.655&#xA;&lt; Exit [BeforeAll] when the component is removed - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:649 @ 05/02/26 05:35:23.188 (7.533s)&#xA;&gt; Enter [It] related image repo and robot accounts deleted - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:661 @ 05/02/26 05:35:23.188&#xA;&lt; Exit [It] related image repo and robot accounts deleted - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:661 @ 05/02/26 05:35:29.731 (6.543s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:35:29.732&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:35:29.732 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the component is removed purge PR is created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="8.832965746">
              <system-err>&gt; Enter [It] purge PR is created successfully - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:679 @ 05/02/26 05:35:29.732&#xA;Found purge PR with id: 3&#xA;&lt; Exit [It] purge PR is created successfully - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:679 @ 05/02/26 05:35:29.953 (220ms)&#xA;&gt; Enter [AfterAll] PaC component build - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:101 @ 05/02/26 05:35:29.953&#xA;&lt; Exit [AfterAll] PaC component build - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:101 @ 05/02/26 05:35:38.565 (8.612s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:35:38.565&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:35:38.565 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace creates component with nudges [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="60.265891797">
              <system-err>&gt; Enter [BeforeAll] component update with renovate - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:72 @ 05/02/26 05:06:21.79&#xA;ReleaseAdmissionPlan data: {&#34;Mapping&#34;:{&#34;Components&#34;:[{&#34;Name&#34;:&#34;gl-multi-component-parent-oajh&#34;,&#34;Repository&#34;:&#34;quay.io/redhat-appstudio-qe/release-repository&#34;}]}}&#xA;&lt; Exit [BeforeAll] component update with renovate - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:72 @ 05/02/26 05:06:48.304 (26.514s)&#xA;&gt; Enter [It] creates component with nudges - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:235 @ 05/02/26 05:06:48.305&#xA;Image repository for component gl-multi-component-child-oajh in namespace build-e2e-blya do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component gl-multi-component-child-oajh in namespace build-e2e-blya do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component gl-multi-component-parent-oajh in namespace build-e2e-blya do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [It] creates component with nudges - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:235 @ 05/02/26 05:07:22.056 (33.751s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:07:22.056&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:07:22.056 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace triggers a PipelineRun for parent component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="69.422301313">
              <system-err>&gt; Enter [It] triggers a PipelineRun for parent component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:259 @ 05/02/26 05:07:22.057&#xA;PipelineRun has not been created yet for the component build-e2e-blya/gl-multi-component-parent-oajh&#xA;PipelineRun has not been created yet for the component build-e2e-blya/gl-multi-component-parent-oajh&#xA;PipelineRun has not been created yet for the component build-e2e-blya/gl-multi-component-parent-oajh&#xA;&lt; Exit [It] triggers a PipelineRun for parent component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:259 @ 05/02/26 05:08:31.479 (1m9.422s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:08:31.479&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:08:31.479 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for parent component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="551.942558441">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully for parent component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:274 @ 05/02/26 05:08:31.479&#xA;PipelineRun gl-multi-component-parent-oajh-on-pull-request-b4f67 found for Component build-e2e-blya/gl-multi-component-parent-oajh&#xA;PipelineRun gl-multi-component-parent-oajh-on-pull-request-b4f67 reason: ResolvingTaskRef&#xA;PipelineRun gl-multi-component-parent-oajh-on-pull-request-b4f67 reason: ResolvingTaskRef&#xA;PipelineRun gl-multi-component-parent-oajh-on-pull-request-b4f67 reason: Cancelled&#xA;attempt 1/3: PipelineRun &#34;gl-multi-component-parent-oajh-on-pull-request-b4f67&#34; failed: &#xA; pod: gl-multi-component-parent-oajh-on-pull-request-k49zc-init-pod | init container: prepare&#xA;2026/05/02 05:09:05 Entrypoint initialization&#xA;&#xA;pod: gl-multi-component-parent-oajh-on-pull-request-k49zc-init-pod | container step-init: &#xA;time=&#34;2026-05-02T05:09:08Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-05-02T05:09:08Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-05-02T05:09:08Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-05-02T05:09:08Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-05-02T05:09:08Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-05-02T05:09:08Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-02T05:09:08Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-05-02T05:09:08Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-05-02T05:09:08Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;New PipelineRun gl-multi-component-parent-oajh-on-pull-request-jf87j found after retrigger for component build-e2e-blya/gl-multi-component-parent-oajh&#xA;PipelineRun gl-multi-component-parent-oajh-on-pull-request-jf87j found for Component build-e2e-blya/gl-multi-component-parent-oajh&#xA;PipelineRun gl-multi-component-parent-oajh-on-pull-request-jf87j reason: ResolvingTaskRef&#xA;PipelineRun gl-multi-component-parent-oajh-on-pull-request-jf87j reason: ResolvingTaskRef&#xA;PipelineRun gl-multi-component-parent-oajh-on-pull-request-jf87j reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-pull-request-jf87j reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-pull-request-jf87j reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-pull-request-jf87j reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-pull-request-jf87j reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-pull-request-jf87j reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-pull-request-jf87j reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-pull-request-jf87j reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-pull-request-jf87j reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-pull-request-jf87j reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-pull-request-jf87j reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-pull-request-jf87j reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-pull-request-jf87j reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-pull-request-jf87j reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-pull-request-jf87j reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-pull-request-jf87j reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-pull-request-jf87j reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-pull-request-jf87j reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-pull-request-jf87j reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-pull-request-jf87j reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-pull-request-jf87j reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-pull-request-jf87j reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-pull-request-jf87j reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-pull-request-jf87j reason: Succeeded&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully for parent component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:274 @ 05/02/26 05:17:43.422 (9m11.942s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:17:43.422&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:17:43.422 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for child component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="291.760017883">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully for child component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:285 @ 05/02/26 05:17:43.422&#xA;PipelineRun gl-multi-component-child-oajh-on-pull-request-s995m found for Component build-e2e-blya/gl-multi-component-child-oajh&#xA;PipelineRun gl-multi-component-child-oajh-on-pull-request-s995m reason: Failed&#xA;attempt 1/3: PipelineRun &#34;gl-multi-component-child-oajh-on-pull-request-s995m&#34; failed: &#xA; pod: gl-multi-component-child-oajh-on-pull-request-s995m-init-pod | init container: prepare&#xA;2026/05/02 05:08:39 Entrypoint initialization&#xA;&#xA;pod: gl-multi-component-child-oajh-on-pull-request-s995m-init-pod | container step-init: &#xA;time=&#34;2026-05-02T05:08:42Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-05-02T05:08:42Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-05-02T05:08:42Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-05-02T05:08:42Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-05-02T05:08:42Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-05-02T05:08:42Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-02T05:08:42Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-05-02T05:08:42Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-05-02T05:08:42Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;New PipelineRun gl-multi-component-child-oajh-on-pull-request-4ndgn found after retrigger for component build-e2e-blya/gl-multi-component-child-oajh&#xA;PipelineRun gl-multi-component-child-oajh-on-pull-request-4ndgn found for Component build-e2e-blya/gl-multi-component-child-oajh&#xA;PipelineRun gl-multi-component-child-oajh-on-pull-request-4ndgn reason: ResolvingTaskRef&#xA;PipelineRun gl-multi-component-child-oajh-on-pull-request-4ndgn reason: Running&#xA;PipelineRun gl-multi-component-child-oajh-on-pull-request-4ndgn reason: Running&#xA;PipelineRun gl-multi-component-child-oajh-on-pull-request-4ndgn reason: Running&#xA;PipelineRun gl-multi-component-child-oajh-on-pull-request-4ndgn reason: Running&#xA;PipelineRun gl-multi-component-child-oajh-on-pull-request-4ndgn reason: Running&#xA;PipelineRun gl-multi-component-child-oajh-on-pull-request-4ndgn reason: Running&#xA;PipelineRun gl-multi-component-child-oajh-on-pull-request-4ndgn reason: Running&#xA;PipelineRun gl-multi-component-child-oajh-on-pull-request-4ndgn reason: Running&#xA;PipelineRun gl-multi-component-child-oajh-on-pull-request-4ndgn reason: Running&#xA;PipelineRun gl-multi-component-child-oajh-on-pull-request-4ndgn reason: Running&#xA;PipelineRun gl-multi-component-child-oajh-on-pull-request-4ndgn reason: Running&#xA;PipelineRun gl-multi-component-child-oajh-on-pull-request-4ndgn reason: Running&#xA;PipelineRun gl-multi-component-child-oajh-on-pull-request-4ndgn reason: Running&#xA;PipelineRun gl-multi-component-child-oajh-on-pull-request-4ndgn reason: Succeeded&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully for child component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:285 @ 05/02/26 05:22:35.182 (4m51.76s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:22:35.182&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:22:35.182 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace should lead to a PaC PR creation for child component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="0.201845625">
              <system-err>&gt; Enter [It] should lead to a PaC PR creation for child component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:289 @ 05/02/26 05:22:35.183&#xA;&lt; Exit [It] should lead to a PaC PR creation for child component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:289 @ 05/02/26 05:22:35.384 (201ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:22:35.385&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:22:35.385 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace Merging the PaC PR should be successful for child component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="1.917535586">
              <system-err>&gt; Enter [It] Merging the PaC PR should be successful for child component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:307 @ 05/02/26 05:22:35.385&#xA;merged result sha: ebd1d1b0b6ee753c5aefed88779677de3f82466b for PR #1&#xA;&lt; Exit [It] Merging the PaC PR should be successful for child component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:307 @ 05/02/26 05:22:37.303 (1.917s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:22:37.303&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:22:37.303 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace create dockerfile and yaml manifest that references build and distribution repositories [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="64.837543531">
              <system-err>&gt; Enter [It] create dockerfile and yaml manifest that references build and distribution repositories - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:318 @ 05/02/26 05:22:37.303&#xA;&lt; Exit [It] create dockerfile and yaml manifest that references build and distribution repositories - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:318 @ 05/02/26 05:23:42.14 (1m4.837s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:23:42.141&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:23:42.141 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace should lead to a PaC PR creation for parent component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="0.213543308">
              <system-err>&gt; Enter [It] should lead to a PaC PR creation for parent component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:358 @ 05/02/26 05:23:42.141&#xA;&lt; Exit [It] should lead to a PaC PR creation for parent component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:358 @ 05/02/26 05:23:42.354 (213ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:23:42.354&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:23:42.355 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace Merging the PaC PR should be successful for parent component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="2.077539098">
              <system-err>&gt; Enter [It] Merging the PaC PR should be successful for parent component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:375 @ 05/02/26 05:23:42.355&#xA;merged result sha: 07e6a7d8ef62c0cfbd6b7900f4992f733bf1ab73 for PR #1&#xA;&lt; Exit [It] Merging the PaC PR should be successful for parent component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:375 @ 05/02/26 05:23:44.432 (2.077s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:23:44.432&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:23:44.432 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace PR merge triggers PAC PipelineRun for parent component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="20.202991466">
              <system-err>&gt; Enter [It] PR merge triggers PAC PipelineRun for parent component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:385 @ 05/02/26 05:23:44.433&#xA;Push PipelineRun has not been created yet for the component build-e2e-blya/gl-multi-component-parent-oajh&#xA;&lt; Exit [It] PR merge triggers PAC PipelineRun for parent component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:385 @ 05/02/26 05:24:04.635 (20.203s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:24:04.636&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:24:04.636 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace PAC PipelineRun for parent component  is successful [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="560.135829798">
              <system-err>&gt; Enter [It] PAC PipelineRun for parent component  is successful - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:401 @ 05/02/26 05:24:04.636&#xA;PipelineRun gl-multi-component-parent-oajh-on-push-gtt8x found for Component build-e2e-blya/gl-multi-component-parent-oajh&#xA;PipelineRun gl-multi-component-parent-oajh-on-push-gtt8x reason: ResolvingTaskRef&#xA;PipelineRun gl-multi-component-parent-oajh-on-push-gtt8x reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-push-gtt8x reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-push-gtt8x reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-push-gtt8x reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-push-gtt8x reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-push-gtt8x reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-push-gtt8x reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-push-gtt8x reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-push-gtt8x reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-push-gtt8x reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-push-gtt8x reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-push-gtt8x reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-push-gtt8x reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-push-gtt8x reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-push-gtt8x reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-push-gtt8x reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-push-gtt8x reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-push-gtt8x reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-push-gtt8x reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-push-gtt8x reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-push-gtt8x reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-push-gtt8x reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-push-gtt8x reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-push-gtt8x reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-push-gtt8x reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-push-gtt8x reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-push-gtt8x reason: Running&#xA;PipelineRun gl-multi-component-parent-oajh-on-push-gtt8x reason: Succeeded&#xA;&lt; Exit [It] PAC PipelineRun for parent component  is successful - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:401 @ 05/02/26 05:33:24.772 (9m20.135s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:33:24.772&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:33:24.772 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace should lead to a nudge PR creation for child component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="496.480569877">
              <system-err>&gt; Enter [It] should lead to a nudge PR creation for child component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:412 @ 05/02/26 05:33:24.772&#xA;&lt; Exit [It] should lead to a nudge PR creation for child component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:412 @ 05/02/26 05:41:41.253 (8m16.48s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:41:41.253&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:41:41.253 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace merging the PR should be successful for child component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="1.191642778">
              <system-err>&gt; Enter [It] merging the PR should be successful for child component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:429 @ 05/02/26 05:41:41.253&#xA;merged result sha: 29cb42cf207dd4be809dcad15867c98bfa606604 for PR #3&#xA;&lt; Exit [It] merging the PR should be successful for child component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:429 @ 05/02/26 05:41:42.445 (1.191s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:41:42.445&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:41:42.445 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace Verify the nudge updated the contents [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="16.155199566">
              <system-err>&gt; Enter [It] Verify the nudge updated the contents - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:440 @ 05/02/26 05:41:42.445&#xA;Verifying Dockerfile.tmp updated to sha sha256:525a21dc5b209b6627bb52cd560ed5a40ff20fada90c76ae18354b4309bc60dacontent: FROM quay.io/redhat-appstudio-qe/build-e2e-blya/gl-multi-component-parent-oajh@sha256:525a21dc5b209b6627bb52cd560ed5a40ff20fada90c76ae18354b4309bc60da&#xA;RUN echo hello&#xA;&#xA;&lt; Exit [It] Verify the nudge updated the contents - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:440 @ 05/02/26 05:41:42.818 (373ms)&#xA;&gt; Enter [AfterAll] component update with renovate - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:214 @ 05/02/26 05:41:42.818&#xA;&lt; Exit [AfterAll] component update with renovate - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:214 @ 05/02/26 05:41:58.6 (15.782s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:41:58.6&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:41:58.6 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when a new Component with specified custom branch is created triggers a Build PipelineRun [integration-service, gitlab-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when a new Component with specified custom branch is created does not contain an annotation with a Snapshot Name [integration-service, gitlab-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when a new Component with specified custom branch is created should lead to build PipelineRun finishing successfully [integration-service, gitlab-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when a new Component with specified custom branch is created should have a related PaC init MR is created [integration-service, gitlab-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when a new Component with specified custom branch is created the PipelineRun should eventually finish successfully for component  [integration-service, gitlab-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when the PaC build pipelineRun run succeeded checks if the BuildPipelineRun have the annotation of chains signed [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when the PaC build pipelineRun run succeeded checks if the Snapshot is created [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when the PaC build pipelineRun run succeeded checks if the Build PipelineRun got annotated with Snapshot name [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when the Snapshot was created should find the Integration Test Scenario PipelineRun [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Integration PipelineRun is created should eventually complete successfully [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Integration PipelineRun is created validates the Integration test scenario PipelineRun is reported to merge request CommitStatus, and it pass [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Integration PipelineRun is created eventually leads to the integration test PipelineRun&#39;s Pass status reported at MR commit status [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Integration PipelineRun is created validates the Integration test scenario PipelineRun is reported to merge request CommitStatus, and it fails [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Integration PipelineRun is created eventually leads to the integration test PipelineRun&#39;s Fail status reported at MR commit status [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Integration PipelineRun is created validates at least one MR note contains the final integration test result [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Integration PipelineRun is created merging the PR should be successful [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Integration PipelineRun is created leads to triggering on push PipelineRun [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Run integration tests after Merged MR should eventually complete successfully [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Run integration tests after Merged MR validates the Integration test scenario PipelineRun is reported to merge request CommitStatus, and it pass [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Run integration tests after Merged MR eventually leads to the integration test PipelineRun&#39;s Pass status reported at MR commit status [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Run integration tests after Merged MR validates the Integration test scenario PipelineRun is reported to merge request CommitStatus, and it fails [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Run integration tests after Merged MR eventually leads to the integration test PipelineRun&#39;s Fail status reported at MR commit status [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace creates component with nudges [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="passed" time="46.023130239">
              <system-err>&gt; Enter [BeforeAll] component update with renovate - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:72 @ 05/02/26 05:06:21.79&#xA;ReleaseAdmissionPlan data: {&#34;Mapping&#34;:{&#34;Components&#34;:[{&#34;Name&#34;:&#34;gh-multi-component-parent-gjgt&#34;,&#34;Repository&#34;:&#34;quay.io/redhat-appstudio-qe/release-repository&#34;}]}}&#xA;&lt; Exit [BeforeAll] component update with renovate - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:72 @ 05/02/26 05:06:27.103 (5.313s)&#xA;&gt; Enter [It] creates component with nudges - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:235 @ 05/02/26 05:06:27.103&#xA;Image repository for component gh-multi-component-child-gjgt in namespace build-e2e-fqgo do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component gh-multi-component-child-gjgt in namespace build-e2e-fqgo do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component gh-multi-component-parent-gjgt in namespace build-e2e-fqgo do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component gh-multi-component-parent-gjgt in namespace build-e2e-fqgo do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [It] creates component with nudges - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:235 @ 05/02/26 05:07:07.812 (40.709s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:07:07.813&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:07:07.813 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace triggers a PipelineRun for parent component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="passed" time="63.939452429">
              <system-err>&gt; Enter [It] triggers a PipelineRun for parent component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:259 @ 05/02/26 05:07:07.813&#xA;PipelineRun has not been created yet for the component build-e2e-fqgo/gh-multi-component-parent-gjgt&#xA;PipelineRun has not been created yet for the component build-e2e-fqgo/gh-multi-component-parent-gjgt&#xA;PipelineRun has not been created yet for the component build-e2e-fqgo/gh-multi-component-parent-gjgt&#xA;&lt; Exit [It] triggers a PipelineRun for parent component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:259 @ 05/02/26 05:08:11.752 (1m3.939s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:08:11.753&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:08:11.753 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for parent component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="passed" time="831.824044654">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully for parent component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:274 @ 05/02/26 05:08:11.753&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-8lbkh found for Component build-e2e-fqgo/gh-multi-component-parent-gjgt&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-8lbkh reason: ResolvingTaskRef&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-8lbkh reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-8lbkh reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-8lbkh reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-8lbkh reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-8lbkh reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-8lbkh reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-8lbkh reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-8lbkh reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-8lbkh reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-8lbkh reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-8lbkh reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-8lbkh reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-8lbkh reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-8lbkh reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-8lbkh reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-8lbkh reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-8lbkh reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-8lbkh reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-8lbkh reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-8lbkh reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-8lbkh reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-8lbkh reason: PipelineRunStopping&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-8lbkh reason: PipelineRunStopping&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-8lbkh reason: PipelineRunStopping&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-8lbkh reason: PipelineRunStopping&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-8lbkh reason: PipelineRunStopping&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-8lbkh reason: Failed&#xA;attempt 1/3: PipelineRun &#34;gh-multi-component-parent-gjgt-on-pull-request-8lbkh&#34; failed: &#xA; pod: gh-multi-component-parent-gjgt-on-pull-request-8lbkh-init-pod | init container: prepare&#xA;2026/05/02 05:08:28 Entrypoint initialization&#xA;&#xA;pod: gh-multi-component-parent-gjgt-on-pull-request-8lbkh-init-pod | container step-init: &#xA;time=&#34;2026-05-02T05:08:31Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-05-02T05:08:31Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-05-02T05:08:31Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-05-02T05:08:31Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-05-02T05:08:31Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-05-02T05:08:31Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-02T05:08:31Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-05-02T05:08:31Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-05-02T05:08:31Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;New PipelineRun gh-multi-component-parent-gjgt-on-pull-request-6k25b found after retrigger for component build-e2e-fqgo/gh-multi-component-parent-gjgt&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-6k25b found for Component build-e2e-fqgo/gh-multi-component-parent-gjgt&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-6k25b reason: ResolvingTaskRef&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-6k25b reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-6k25b reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-6k25b reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-6k25b reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-6k25b reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-6k25b reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-6k25b reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-6k25b reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-6k25b reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-6k25b reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-6k25b reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-6k25b reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-6k25b reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-pull-request-6k25b reason: Succeeded&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully for parent component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:274 @ 05/02/26 05:22:03.577 (13m51.824s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:22:03.577&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:22:03.577 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for child component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="passed" time="372.868187961">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully for child component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:285 @ 05/02/26 05:22:03.578&#xA;PipelineRun gh-multi-component-child-gjgt-on-pull-request-x8pdz found for Component build-e2e-fqgo/gh-multi-component-child-gjgt&#xA;PipelineRun gh-multi-component-child-gjgt-on-pull-request-x8pdz reason: Failed&#xA;attempt 1/3: PipelineRun &#34;gh-multi-component-child-gjgt-on-pull-request-x8pdz&#34; failed: &#xA; pod: gh-multi-component-child-gjgt-on-pull-request-x8pdz-init-pod | init container: prepare&#xA;2026/05/02 05:07:15 Entrypoint initialization&#xA;&#xA;pod: gh-multi-component-child-gjgt-on-pull-request-x8pdz-init-pod | container step-init: &#xA;time=&#34;2026-05-02T05:07:41Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-05-02T05:07:41Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-05-02T05:07:41Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-05-02T05:07:41Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-05-02T05:07:41Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-05-02T05:07:41Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-02T05:07:41Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-05-02T05:07:41Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-05-02T05:07:41Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;New PipelineRun gh-multi-component-child-gjgt-on-pull-request-m7m4z found after retrigger for component build-e2e-fqgo/gh-multi-component-child-gjgt&#xA;PipelineRun gh-multi-component-child-gjgt-on-pull-request-m7m4z found for Component build-e2e-fqgo/gh-multi-component-child-gjgt&#xA;PipelineRun gh-multi-component-child-gjgt-on-pull-request-m7m4z reason: ResolvingTaskRef&#xA;PipelineRun gh-multi-component-child-gjgt-on-pull-request-m7m4z reason: Running&#xA;PipelineRun gh-multi-component-child-gjgt-on-pull-request-m7m4z reason: Running&#xA;PipelineRun gh-multi-component-child-gjgt-on-pull-request-m7m4z reason: Running&#xA;PipelineRun gh-multi-component-child-gjgt-on-pull-request-m7m4z reason: Running&#xA;PipelineRun gh-multi-component-child-gjgt-on-pull-request-m7m4z reason: Running&#xA;PipelineRun gh-multi-component-child-gjgt-on-pull-request-m7m4z reason: Running&#xA;PipelineRun gh-multi-component-child-gjgt-on-pull-request-m7m4z reason: Running&#xA;PipelineRun gh-multi-component-child-gjgt-on-pull-request-m7m4z reason: Running&#xA;PipelineRun gh-multi-component-child-gjgt-on-pull-request-m7m4z reason: Running&#xA;PipelineRun gh-multi-component-child-gjgt-on-pull-request-m7m4z reason: Running&#xA;PipelineRun gh-multi-component-child-gjgt-on-pull-request-m7m4z reason: Running&#xA;PipelineRun gh-multi-component-child-gjgt-on-pull-request-m7m4z reason: Running&#xA;PipelineRun gh-multi-component-child-gjgt-on-pull-request-m7m4z reason: Running&#xA;PipelineRun gh-multi-component-child-gjgt-on-pull-request-m7m4z reason: Running&#xA;PipelineRun gh-multi-component-child-gjgt-on-pull-request-m7m4z reason: Running&#xA;PipelineRun gh-multi-component-child-gjgt-on-pull-request-m7m4z reason: Running&#xA;PipelineRun gh-multi-component-child-gjgt-on-pull-request-m7m4z reason: Running&#xA;PipelineRun gh-multi-component-child-gjgt-on-pull-request-m7m4z reason: Succeeded&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully for child component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:285 @ 05/02/26 05:28:16.446 (6m12.868s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:28:16.446&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:28:16.446 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace should lead to a PaC PR creation for child component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="passed" time="0.243207116">
              <system-err>&gt; Enter [It] should lead to a PaC PR creation for child component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:289 @ 05/02/26 05:28:16.446&#xA;&lt; Exit [It] should lead to a PaC PR creation for child component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:289 @ 05/02/26 05:28:16.689 (243ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:28:16.69&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:28:16.69 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace Merging the PaC PR should be successful for child component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="passed" time="1.845907526">
              <system-err>&gt; Enter [It] Merging the PaC PR should be successful for child component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:307 @ 05/02/26 05:28:16.69&#xA;merged result sha: c2336c1f3ccedd65ac1b7f7e1938a92c20a8508e for PR #1&#xA;&lt; Exit [It] Merging the PaC PR should be successful for child component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:307 @ 05/02/26 05:28:18.536 (1.846s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:28:18.536&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:28:18.536 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace create dockerfile and yaml manifest that references build and distribution repositories [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="passed" time="4.681378202">
              <system-err>&gt; Enter [It] create dockerfile and yaml manifest that references build and distribution repositories - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:318 @ 05/02/26 05:28:18.536&#xA;&lt; Exit [It] create dockerfile and yaml manifest that references build and distribution repositories - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:318 @ 05/02/26 05:28:23.217 (4.681s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:28:23.218&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:28:23.218 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace should lead to a PaC PR creation for parent component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="passed" time="0.160053591">
              <system-err>&gt; Enter [It] should lead to a PaC PR creation for parent component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:358 @ 05/02/26 05:28:23.218&#xA;&lt; Exit [It] should lead to a PaC PR creation for parent component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:358 @ 05/02/26 05:28:23.378 (160ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:28:23.378&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:28:23.378 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace Merging the PaC PR should be successful for parent component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="passed" time="1.639516207">
              <system-err>&gt; Enter [It] Merging the PaC PR should be successful for parent component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:375 @ 05/02/26 05:28:23.379&#xA;merged result sha: 25ec6eef41c6c29ace468795c2e55d4b14166ec6 for PR #1&#xA;&lt; Exit [It] Merging the PaC PR should be successful for parent component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:375 @ 05/02/26 05:28:25.018 (1.639s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:28:25.018&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:28:25.018 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace PR merge triggers PAC PipelineRun for parent component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="passed" time="20.563737306">
              <system-err>&gt; Enter [It] PR merge triggers PAC PipelineRun for parent component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:385 @ 05/02/26 05:28:25.019&#xA;Push PipelineRun has not been created yet for the component build-e2e-fqgo/gh-multi-component-parent-gjgt&#xA;&lt; Exit [It] PR merge triggers PAC PipelineRun for parent component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:385 @ 05/02/26 05:28:45.582 (20.563s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:28:45.582&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:28:45.582 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace PAC PipelineRun for parent component  is successful [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="passed" time="960.689046416">
              <system-err>&gt; Enter [It] PAC PipelineRun for parent component  is successful - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:401 @ 05/02/26 05:28:45.583&#xA;PipelineRun gh-multi-component-parent-gjgt-on-push-c5w9s found for Component build-e2e-fqgo/gh-multi-component-parent-gjgt&#xA;PipelineRun gh-multi-component-parent-gjgt-on-push-c5w9s reason: ResolvingTaskRef&#xA;PipelineRun gh-multi-component-parent-gjgt-on-push-c5w9s reason: ResolvingTaskRef&#xA;PipelineRun gh-multi-component-parent-gjgt-on-push-c5w9s reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-push-c5w9s reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-push-c5w9s reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-push-c5w9s reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-push-c5w9s reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-push-c5w9s reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-push-c5w9s reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-push-c5w9s reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-push-c5w9s reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-push-c5w9s reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-push-c5w9s reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-push-c5w9s reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-push-c5w9s reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-push-c5w9s reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-push-c5w9s reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-push-c5w9s reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-push-c5w9s reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-push-c5w9s reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-push-c5w9s reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-push-c5w9s reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-push-c5w9s reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-push-c5w9s reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-push-c5w9s reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-push-c5w9s reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-push-c5w9s reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-push-c5w9s reason: Running&#xA;PipelineRun has not been created yet for the Component build-e2e-fqgo/gh-multi-component-parent-gjgt&#xA;PipelineRun has not been created yet for the Component build-e2e-fqgo/gh-multi-component-parent-gjgt&#xA;PipelineRun has not been created yet for the Component build-e2e-fqgo/gh-multi-component-parent-gjgt&#xA;PipelineRun has not been created yet for the Component build-e2e-fqgo/gh-multi-component-parent-gjgt&#xA;PipelineRun has not been created yet for the Component build-e2e-fqgo/gh-multi-component-parent-gjgt&#xA;PipelineRun has not been created yet for the Component build-e2e-fqgo/gh-multi-component-parent-gjgt&#xA;PipelineRun has not been created yet for the Component build-e2e-fqgo/gh-multi-component-parent-gjgt&#xA;PipelineRun has not been created yet for the Component build-e2e-fqgo/gh-multi-component-parent-gjgt&#xA;PipelineRun gh-multi-component-parent-gjgt-on-push-c5w9s reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-push-c5w9s reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-push-c5w9s reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-push-c5w9s reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-push-c5w9s reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-push-c5w9s reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-push-c5w9s reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-push-c5w9s reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-push-c5w9s reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-push-c5w9s reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-push-c5w9s reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-push-c5w9s reason: Running&#xA;PipelineRun gh-multi-component-parent-gjgt-on-push-c5w9s reason: Succeeded&#xA;&lt; Exit [It] PAC PipelineRun for parent component  is successful - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:401 @ 05/02/26 05:44:46.271 (16m0.689s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:44:46.271&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:44:46.272 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace should lead to a nudge PR creation for child component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="passed" time="20.48477394">
              <system-err>&gt; Enter [It] should lead to a nudge PR creation for child component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:412 @ 05/02/26 05:44:46.272&#xA;&lt; Exit [It] should lead to a nudge PR creation for child component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:412 @ 05/02/26 05:45:06.756 (20.484s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:45:06.757&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:45:06.757 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace merging the PR should be successful for child component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="passed" time="1.442692231">
              <system-err>&gt; Enter [It] merging the PR should be successful for child component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:429 @ 05/02/26 05:45:06.757&#xA;merged result sha: 042b5b202bfb89efb6d19fc1f4c15a42f9ec88a0 for PR #3&#xA;&lt; Exit [It] merging the PR should be successful for child component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:429 @ 05/02/26 05:45:08.2 (1.442s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:45:08.2&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:45:08.2 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace Verify the nudge updated the contents [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="passed" time="12.656535676">
              <system-err>&gt; Enter [It] Verify the nudge updated the contents - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:440 @ 05/02/26 05:45:08.2&#xA;Verifying Dockerfile.tmp updated to sha sha256:e38a91b5c3fdcb1375cb53d3bd0ef0b688014a4eded127a50eb10146884b6ba0content: FROM quay.io/redhat-appstudio-qe/build-e2e-fqgo/gh-multi-component-parent-gjgt@sha256:e38a91b5c3fdcb1375cb53d3bd0ef0b688014a4eded127a50eb10146884b6ba0&#xA;RUN echo hello&#xA;&#xA;&lt; Exit [It] Verify the nudge updated the contents - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:440 @ 05/02/26 05:45:08.349 (149ms)&#xA;&gt; Enter [AfterAll] component update with renovate - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:214 @ 05/02/26 05:45:08.349&#xA;&lt; Exit [AfterAll] component update with renovate - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:214 @ 05/02/26 05:45:20.857 (12.507s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:45:20.857&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:45:20.857 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] infrastructure is running verifies if the chains controller is running [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] infrastructure is running verifies the signing secret is present [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task creates signature and attestation [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task succeeds when policy is met [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task does not pass when tests are not satisfied on non-strict mode [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task fails when tests are not satisfied on strict mode [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task fails when unexpected signature is used [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task ec-cli command verifies ec cli has error handling [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task ec-cli command verifies ec validate accepts a list of image references [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task Release Policy verifies redhat products pass the redhat policy rule collection before release  [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task Release Policy verifies the release policy: Task are trusted [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task Release Policy verifies the release policy: Task references are pinned [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace creates component with nudges [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="passed" time="49.678266727">
              <system-err>&gt; Enter [BeforeAll] component update with renovate - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:72 @ 05/02/26 05:06:21.789&#xA;ReleaseAdmissionPlan data: {&#34;Mapping&#34;:{&#34;Components&#34;:[{&#34;Name&#34;:&#34;fj-multi-component-parent-byxd&#34;,&#34;Repository&#34;:&#34;quay.io/redhat-appstudio-qe/release-repository&#34;}]}}&#xA;&lt; Exit [BeforeAll] component update with renovate - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:72 @ 05/02/26 05:06:31.19 (9.401s)&#xA;&gt; Enter [It] creates component with nudges - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:235 @ 05/02/26 05:06:31.19&#xA;Image repository for component fj-multi-component-child-byxd in namespace build-e2e-grnp do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component fj-multi-component-child-byxd in namespace build-e2e-grnp do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component fj-multi-component-parent-byxd in namespace build-e2e-grnp do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component fj-multi-component-parent-byxd in namespace build-e2e-grnp do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [It] creates component with nudges - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:235 @ 05/02/26 05:07:11.467 (40.277s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:07:11.467&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:07:11.467 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace triggers a PipelineRun for parent component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="passed" time="80.626932488">
              <system-err>&gt; Enter [It] triggers a PipelineRun for parent component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:259 @ 05/02/26 05:07:11.468&#xA;PipelineRun has not been created yet for the component build-e2e-grnp/fj-multi-component-parent-byxd&#xA;PipelineRun has not been created yet for the component build-e2e-grnp/fj-multi-component-parent-byxd&#xA;PipelineRun has not been created yet for the component build-e2e-grnp/fj-multi-component-parent-byxd&#xA;&lt; Exit [It] triggers a PipelineRun for parent component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:259 @ 05/02/26 05:08:32.094 (1m20.627s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:08:32.095&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:08:32.095 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for parent component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="passed" time="793.100500985">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully for parent component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:274 @ 05/02/26 05:08:32.095&#xA;PipelineRun fj-multi-component-parent-byxd-on-pull-request-wpcb4 found for Component build-e2e-grnp/fj-multi-component-parent-byxd&#xA;PipelineRun fj-multi-component-parent-byxd-on-pull-request-wpcb4 reason: ResolvingTaskRef&#xA;PipelineRun fj-multi-component-parent-byxd-on-pull-request-wpcb4 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-pull-request-wpcb4 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-pull-request-wpcb4 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-pull-request-wpcb4 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-pull-request-wpcb4 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-pull-request-wpcb4 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-pull-request-wpcb4 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-pull-request-wpcb4 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-pull-request-wpcb4 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-pull-request-wpcb4 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-pull-request-wpcb4 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-pull-request-wpcb4 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-pull-request-wpcb4 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-pull-request-wpcb4 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-pull-request-wpcb4 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-pull-request-wpcb4 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-pull-request-wpcb4 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-pull-request-wpcb4 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-pull-request-wpcb4 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-pull-request-wpcb4 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-pull-request-wpcb4 reason: PipelineRunStopping&#xA;PipelineRun fj-multi-component-parent-byxd-on-pull-request-wpcb4 reason: PipelineRunStopping&#xA;PipelineRun fj-multi-component-parent-byxd-on-pull-request-wpcb4 reason: PipelineRunStopping&#xA;PipelineRun fj-multi-component-parent-byxd-on-pull-request-wpcb4 reason: PipelineRunStopping&#xA;PipelineRun fj-multi-component-parent-byxd-on-pull-request-wpcb4 reason: Failed&#xA;attempt 1/3: PipelineRun &#34;fj-multi-component-parent-byxd-on-pull-request-wpcb4&#34; failed: &#xA; pod: fj-multi-component-parent-byxd-on-pull-request-wpcb4-init-pod | init container: prepare&#xA;2026/05/02 05:08:52 Entrypoint initialization&#xA;&#xA;pod: fj-multi-component-parent-byxd-on-pull-request-wpcb4-init-pod | container step-init: &#xA;time=&#34;2026-05-02T05:08:55Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-05-02T05:08:55Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-05-02T05:08:55Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-05-02T05:08:55Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-05-02T05:08:55Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-05-02T05:08:55Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-02T05:08:55Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-05-02T05:08:55Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-05-02T05:08:55Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;New PipelineRun fj-multi-component-parent-byxd-on-pull-request-vz7dw found after retrigger for component build-e2e-grnp/fj-multi-component-parent-byxd&#xA;PipelineRun fj-multi-component-parent-byxd-on-pull-request-vz7dw found for Component build-e2e-grnp/fj-multi-component-parent-byxd&#xA;PipelineRun fj-multi-component-parent-byxd-on-pull-request-vz7dw reason: ResolvingTaskRef&#xA;PipelineRun fj-multi-component-parent-byxd-on-pull-request-vz7dw reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-pull-request-vz7dw reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-pull-request-vz7dw reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-pull-request-vz7dw reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-pull-request-vz7dw reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-pull-request-vz7dw reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-pull-request-vz7dw reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-pull-request-vz7dw reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-pull-request-vz7dw reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-pull-request-vz7dw reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-pull-request-vz7dw reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-pull-request-vz7dw reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-pull-request-vz7dw reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-pull-request-vz7dw reason: Succeeded&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully for parent component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:274 @ 05/02/26 05:21:45.195 (13m13.1s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:21:45.195&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:21:45.195 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for child component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="passed" time="353.065681998">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully for child component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:285 @ 05/02/26 05:21:45.196&#xA;PipelineRun fj-multi-component-child-byxd-on-pull-request-7nqpn found for Component build-e2e-grnp/fj-multi-component-child-byxd&#xA;PipelineRun fj-multi-component-child-byxd-on-pull-request-7nqpn reason: Failed&#xA;attempt 1/3: PipelineRun &#34;fj-multi-component-child-byxd-on-pull-request-7nqpn&#34; failed: &#xA; pod: fj-multi-component-child-byxd-on-pull-request-7nqpn-init-pod | init container: prepare&#xA;2026/05/02 05:07:51 Entrypoint initialization&#xA;&#xA;pod: fj-multi-component-child-byxd-on-pull-request-7nqpn-init-pod | container step-init: &#xA;time=&#34;2026-05-02T05:07:53Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-05-02T05:07:53Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-05-02T05:07:53Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-05-02T05:07:53Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-05-02T05:07:53Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-05-02T05:07:53Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-02T05:07:53Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-05-02T05:07:53Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-05-02T05:07:53Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;New PipelineRun fj-multi-component-child-byxd-on-pull-request-blv7g found after retrigger for component build-e2e-grnp/fj-multi-component-child-byxd&#xA;PipelineRun fj-multi-component-child-byxd-on-pull-request-blv7g found for Component build-e2e-grnp/fj-multi-component-child-byxd&#xA;PipelineRun fj-multi-component-child-byxd-on-pull-request-blv7g reason: ResolvingTaskRef&#xA;PipelineRun fj-multi-component-child-byxd-on-pull-request-blv7g reason: Running&#xA;PipelineRun fj-multi-component-child-byxd-on-pull-request-blv7g reason: Running&#xA;PipelineRun fj-multi-component-child-byxd-on-pull-request-blv7g reason: Running&#xA;PipelineRun fj-multi-component-child-byxd-on-pull-request-blv7g reason: Running&#xA;PipelineRun fj-multi-component-child-byxd-on-pull-request-blv7g reason: Running&#xA;PipelineRun fj-multi-component-child-byxd-on-pull-request-blv7g reason: Running&#xA;PipelineRun fj-multi-component-child-byxd-on-pull-request-blv7g reason: Running&#xA;PipelineRun fj-multi-component-child-byxd-on-pull-request-blv7g reason: Running&#xA;PipelineRun fj-multi-component-child-byxd-on-pull-request-blv7g reason: Running&#xA;PipelineRun fj-multi-component-child-byxd-on-pull-request-blv7g reason: Running&#xA;PipelineRun fj-multi-component-child-byxd-on-pull-request-blv7g reason: Running&#xA;PipelineRun fj-multi-component-child-byxd-on-pull-request-blv7g reason: Running&#xA;PipelineRun fj-multi-component-child-byxd-on-pull-request-blv7g reason: Running&#xA;PipelineRun fj-multi-component-child-byxd-on-pull-request-blv7g reason: Running&#xA;PipelineRun fj-multi-component-child-byxd-on-pull-request-blv7g reason: Running&#xA;PipelineRun fj-multi-component-child-byxd-on-pull-request-blv7g reason: Running&#xA;PipelineRun fj-multi-component-child-byxd-on-pull-request-blv7g reason: Succeeded&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully for child component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:285 @ 05/02/26 05:27:38.261 (5m53.065s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:27:38.261&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:27:38.262 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace should lead to a PaC PR creation for child component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="passed" time="0.487214171">
              <system-err>&gt; Enter [It] should lead to a PaC PR creation for child component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:289 @ 05/02/26 05:27:38.262&#xA;&lt; Exit [It] should lead to a PaC PR creation for child component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:289 @ 05/02/26 05:27:38.749 (487ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:27:38.749&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:27:38.749 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace Merging the PaC PR should be successful for child component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="passed" time="2.326720409">
              <system-err>&gt; Enter [It] Merging the PaC PR should be successful for child component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:307 @ 05/02/26 05:27:38.75&#xA;merged result sha: 83d902c999294dda721a0e271fa2022f73aaed48 for PR #1&#xA;&lt; Exit [It] Merging the PaC PR should be successful for child component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:307 @ 05/02/26 05:27:41.076 (2.326s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:27:41.076&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:27:41.076 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace create dockerfile and yaml manifest that references build and distribution repositories [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="passed" time="8.664146081">
              <system-err>&gt; Enter [It] create dockerfile and yaml manifest that references build and distribution repositories - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:318 @ 05/02/26 05:27:41.077&#xA;&lt; Exit [It] create dockerfile and yaml manifest that references build and distribution repositories - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:318 @ 05/02/26 05:27:49.741 (8.664s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:27:49.741&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:27:49.741 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace should lead to a PaC PR creation for parent component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="passed" time="0.2037367">
              <system-err>&gt; Enter [It] should lead to a PaC PR creation for parent component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:358 @ 05/02/26 05:27:49.742&#xA;&lt; Exit [It] should lead to a PaC PR creation for parent component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:358 @ 05/02/26 05:27:49.945 (203ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:27:49.945&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:27:49.945 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace Merging the PaC PR should be successful for parent component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="passed" time="2.37188084">
              <system-err>&gt; Enter [It] Merging the PaC PR should be successful for parent component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:375 @ 05/02/26 05:27:49.946&#xA;merged result sha: 1a0457c33a4eddbf216cdc525b50a884b2a5fa14 for PR #1&#xA;&lt; Exit [It] Merging the PaC PR should be successful for parent component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:375 @ 05/02/26 05:27:52.317 (2.371s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:27:52.318&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:27:52.318 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace PR merge triggers PAC PipelineRun for parent component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="passed" time="20.323119387">
              <system-err>&gt; Enter [It] PR merge triggers PAC PipelineRun for parent component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:385 @ 05/02/26 05:27:52.318&#xA;Push PipelineRun has not been created yet for the component build-e2e-grnp/fj-multi-component-parent-byxd&#xA;&lt; Exit [It] PR merge triggers PAC PipelineRun for parent component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:385 @ 05/02/26 05:28:12.641 (20.323s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:28:12.641&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:28:12.641 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace PAC PipelineRun for parent component  is successful [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="passed" time="1020.134752019">
              <system-err>&gt; Enter [It] PAC PipelineRun for parent component  is successful - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:401 @ 05/02/26 05:28:12.642&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 found for Component build-e2e-grnp/fj-multi-component-parent-byxd&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 reason: ResolvingTaskRef&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 reason: Running&#xA;PipelineRun has not been created yet for the Component build-e2e-grnp/fj-multi-component-parent-byxd&#xA;PipelineRun has not been created yet for the Component build-e2e-grnp/fj-multi-component-parent-byxd&#xA;PipelineRun has not been created yet for the Component build-e2e-grnp/fj-multi-component-parent-byxd&#xA;PipelineRun has not been created yet for the Component build-e2e-grnp/fj-multi-component-parent-byxd&#xA;PipelineRun has not been created yet for the Component build-e2e-grnp/fj-multi-component-parent-byxd&#xA;PipelineRun has not been created yet for the Component build-e2e-grnp/fj-multi-component-parent-byxd&#xA;PipelineRun has not been created yet for the Component build-e2e-grnp/fj-multi-component-parent-byxd&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 reason: Running&#xA;PipelineRun fj-multi-component-parent-byxd-on-push-726j9 reason: Succeeded&#xA;&lt; Exit [It] PAC PipelineRun for parent component  is successful - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:401 @ 05/02/26 05:45:12.776 (17m0.134s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:45:12.776&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:45:12.776 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace should lead to a nudge PR creation for child component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="passed" time="20.749936257999998">
              <system-err>&gt; Enter [It] should lead to a nudge PR creation for child component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:412 @ 05/02/26 05:45:12.777&#xA;&lt; Exit [It] should lead to a nudge PR creation for child component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:412 @ 05/02/26 05:45:33.527 (20.75s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:45:33.527&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:45:33.527 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace merging the PR should be successful for child component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="passed" time="2.2319092">
              <system-err>&gt; Enter [It] merging the PR should be successful for child component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:429 @ 05/02/26 05:45:33.527&#xA;merged result sha: b632e70ac61d643a40df382bb4c528302864c8e9 for PR #3&#xA;&lt; Exit [It] merging the PR should be successful for child component  - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:429 @ 05/02/26 05:45:35.759 (2.232s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:45:35.759&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:45:35.759 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace Verify the nudge updated the contents [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="passed" time="19.823890645">
              <system-err>&gt; Enter [It] Verify the nudge updated the contents - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:440 @ 05/02/26 05:45:35.76&#xA;Verifying Dockerfile.tmp updated to sha sha256:1f404e5d9519b2da548023d8943261589e8df2291c4a460a45291b2897394cabcontent: FROM quay.io/redhat-appstudio-qe/build-e2e-grnp/fj-multi-component-parent-byxd@sha256:1f404e5d9519b2da548023d8943261589e8df2291c4a460a45291b2897394cab&#xA;RUN echo hello&#xA;&#xA;&lt; Exit [It] Verify the nudge updated the contents - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:440 @ 05/02/26 05:45:36.146 (386ms)&#xA;&gt; Enter [AfterAll] component update with renovate - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:214 @ 05/02/26 05:45:36.146&#xA;&lt; Exit [AfterAll] component update with renovate - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:214 @ 05/02/26 05:45:55.583 (19.437s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:45:55.583&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/renovate.go:28 @ 05/02/26 05:45:55.583 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private correctly targets the default branch (that is not named &#39;main&#39;) with PaC [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="91.378510994">
              <system-err>&gt; Enter [BeforeAll] PaC component build - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:54 @ 05/02/26 05:06:21.685&#xA;&lt; Exit [BeforeAll] PaC component build - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:54 @ 05/02/26 05:06:26.142 (4.457s)&#xA;&gt; Enter [BeforeAll] when a new component without specified branch is created and with visibility private - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:117 @ 05/02/26 05:06:26.142&#xA;Image repository for component gh-test-custom-default-rgxwxn in namespace build-e2e-gfsr do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component gh-test-custom-default-rgxwxn in namespace build-e2e-gfsr do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [BeforeAll] when a new component without specified branch is created and with visibility private - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:117 @ 05/02/26 05:06:46.282 (20.14s)&#xA;&gt; Enter [It] correctly targets the default branch (that is not named &#39;main&#39;) with PaC - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:136 @ 05/02/26 05:06:46.282&#xA;&lt; Exit [It] correctly targets the default branch (that is not named &#39;main&#39;) with PaC - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:136 @ 05/02/26 05:07:53.063 (1m6.781s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:07:53.063&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:07:53.063 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private workspace parameter is set correctly in PaC repository CR [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.133338247">
              <system-err>&gt; Enter [It] workspace parameter is set correctly in PaC repository CR - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:153 @ 05/02/26 05:07:53.064&#xA;&lt; Exit [It] workspace parameter is set correctly in PaC repository CR - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:153 @ 05/02/26 05:07:53.197 (133ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:07:53.197&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:07:53.197 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="20.268576176">
              <system-err>&gt; Enter [It] triggers a PipelineRun - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:176 @ 05/02/26 05:07:53.198&#xA;&lt; Exit [It] triggers a PipelineRun - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:176 @ 05/02/26 05:08:13.466 (20.268s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:13.466&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:13.466 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private build pipeline uses the correct serviceAccount [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.000390507">
              <system-err>&gt; Enter [It] build pipeline uses the correct serviceAccount - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:191 @ 05/02/26 05:08:13.467&#xA;&lt; Exit [It] build pipeline uses the correct serviceAccount - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:191 @ 05/02/26 05:08:13.467 (0s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:13.467&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:13.467 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private component build status is set correctly [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.088511264">
              <system-err>&gt; Enter [It] component build status is set correctly - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:195 @ 05/02/26 05:08:13.468&#xA;build status annotation value: {&#34;pac&#34;:{&#34;state&#34;:&#34;enabled&#34;,&#34;merge-url&#34;:&#34;https://github.com/redhat-appstudio-qe/devfile-sample-hello-world-yfhepj/pull/1&#34;,&#34;configuration-time&#34;:&#34;Sat, 02 May 2026 05:07:48 UTC&#34;},&#34;message&#34;:&#34;done&#34;}&#xA;state: enabled&#xA;mergeUrl: https://github.com/redhat-appstudio-qe/devfile-sample-hello-world-yfhepj/pull/1&#xA;errId: 0&#xA;errMessage: &#xA;configurationTime: Sat, 02 May 2026 05:07:48 UTC&#xA;&lt; Exit [It] component build status is set correctly - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:195 @ 05/02/26 05:08:13.556 (88ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:13.556&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:13.556 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.992365238">
              <system-err>&gt; Enter [It] image repo and robot account created successfully - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:225 @ 05/02/26 05:08:13.557&#xA;&lt; Exit [It] image repo and robot account created successfully - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:225 @ 05/02/26 05:08:14.549 (992ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:14.549&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:14.549 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private created image repo is private [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.306493724">
              <system-err>&gt; Enter [It] created image repo is private - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:243 @ 05/02/26 05:08:14.549&#xA;&lt; Exit [It] created image repo is private - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:243 @ 05/02/26 05:08:14.855 (306ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:14.856&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:14.856 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private a related PipelineRun should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="25.963709969">
              <system-err>&gt; Enter [It] a related PipelineRun should be deleted after deleting the component - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:249 @ 05/02/26 05:08:14.856&#xA;&lt; Exit [It] a related PipelineRun should be deleted after deleting the component - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:249 @ 05/02/26 05:08:40.82 (25.963s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:40.82&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:40.82 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private PR branch should not exist in the repo [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.157722009">
              <system-err>&gt; Enter [It] PR branch should not exist in the repo - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:265 @ 05/02/26 05:08:40.82&#xA;&lt; Exit [It] PR branch should not exist in the repo - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:265 @ 05/02/26 05:08:40.978 (157ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:40.978&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:40.978 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private related image repo and the robot account should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="1.474152633">
              <system-err>&gt; Enter [It] related image repo and the robot account should be deleted after deleting the component - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:278 @ 05/02/26 05:08:40.979&#xA;&lt; Exit [It] related image repo and the robot account should be deleted after deleting the component - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:278 @ 05/02/26 05:08:42.452 (1.474s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:42.452&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:08:42.453 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="30.921256133">
              <system-err>&gt; Enter [BeforeAll] when a new Component with specified custom branch is created - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:306 @ 05/02/26 05:08:42.453&#xA;Image repository for component gh-test-custom-branch-wtuska in namespace build-e2e-gfsr do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [BeforeAll] when a new Component with specified custom branch is created - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:306 @ 05/02/26 05:08:53.174 (10.721s)&#xA;&gt; Enter [It] triggers a PipelineRun - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:332 @ 05/02/26 05:08:53.174&#xA;PipelineRun has not been created yet for the component build-e2e-gfsr/gh-test-custom-branch-wtuska&#xA;&lt; Exit [It] triggers a PipelineRun - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:332 @ 05/02/26 05:09:13.374 (20.2s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:09:13.374&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:09:13.374 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created should lead to a PaC init PR creation [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.249024712">
              <system-err>&gt; Enter [It] should lead to a PaC init PR creation - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:347 @ 05/02/26 05:09:13.375&#xA;&lt; Exit [It] should lead to a PaC init PR creation - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:347 @ 05/02/26 05:09:13.624 (249ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:09:13.624&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:09:13.624 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created the PipelineRun should eventually finish successfully [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="691.652926413">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:365 @ 05/02/26 05:09:13.624&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-p2948 found for Component build-e2e-gfsr/gh-test-custom-branch-wtuska&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-p2948 reason: ResolvingTaskRef&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-p2948 reason: ResolvingTaskRef&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-p2948 reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-p2948 reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-p2948 reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-p2948 reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-p2948 reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-p2948 reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-p2948 reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-p2948 reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-p2948 reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-p2948 reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-p2948 reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-p2948 reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-p2948 reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-p2948 reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-p2948 reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-p2948 reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-p2948 reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-p2948 reason: Failed&#xA;attempt 1/3: PipelineRun &#34;gh-test-custom-branch-wtuska-on-pull-request-p2948&#34; failed: &#xA; pod: gh-test-custom-branch-wtuska-on-pull-request-p2948-init-pod | init container: prepare&#xA;2026/05/02 05:09:45 Entrypoint initialization&#xA;&#xA;pod: gh-test-custom-branch-wtuska-on-pull-request-p2948-init-pod | container step-init: &#xA;time=&#34;2026-05-02T05:09:47Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-05-02T05:09:47Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-05-02T05:09:47Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-05-02T05:09:47Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-05-02T05:09:47Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-05-02T05:09:47Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-02T05:09:47Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-05-02T05:09:47Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-05-02T05:09:47Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;New PipelineRun gh-test-custom-branch-wtuska-on-pull-request-tg9nv found after retrigger for component build-e2e-gfsr/gh-test-custom-branch-wtuska&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-tg9nv found for Component build-e2e-gfsr/gh-test-custom-branch-wtuska&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-tg9nv reason: ResolvingTaskRef&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-tg9nv reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-tg9nv reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-tg9nv reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-tg9nv reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-tg9nv reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-tg9nv reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-tg9nv reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-tg9nv reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-tg9nv reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-tg9nv reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-tg9nv reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-tg9nv reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-tg9nv reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-tg9nv reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-tg9nv reason: Succeeded&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:365 @ 05/02/26 05:20:45.277 (11m31.653s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:20:45.277&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:20:45.277 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="1.050833451">
              <system-err>&gt; Enter [It] image repo and robot account created successfully - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:371 @ 05/02/26 05:20:45.278&#xA;&lt; Exit [It] image repo and robot account created successfully - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:371 @ 05/02/26 05:20:46.328 (1.05s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:20:46.328&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:20:46.328 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created created image repo is public [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.289599121">
              <system-err>&gt; Enter [It] created image repo is public - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:390 @ 05/02/26 05:20:46.329&#xA;&lt; Exit [It] created image repo is public - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:390 @ 05/02/26 05:20:46.618 (289ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:20:46.618&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:20:46.618 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created image tag is updated successfully [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.588686539">
              <system-err>&gt; Enter [It] image tag is updated successfully - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:396 @ 05/02/26 05:20:46.619&#xA;Image tag quay.io/redhat-appstudio-qe/build-e2e-gfsr/gh-test-custom-branch-wtuska:on-pr-5e62844f9d8a0616b9b3e66c920ddfbd41f08d66 successfully found in Quay&#xA;&lt; Exit [It] image tag is updated successfully - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:396 @ 05/02/26 05:20:47.207 (588ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:20:47.207&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:20:47.207 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created should ensure pruning labels are set [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.548256518">
              <system-err>&gt; Enter [It] should ensure pruning labels are set - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:425 @ 05/02/26 05:20:47.208&#xA;&lt; Exit [It] should ensure pruning labels are set - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:425 @ 05/02/26 05:20:47.756 (548ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:20:47.756&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:20:47.756 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created eventually leads to the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.491281227">
              <system-err>&gt; Enter [It] eventually leads to the PipelineRun status report at Checks tab - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:439 @ 05/02/26 05:20:47.757&#xA;&lt; Exit [It] eventually leads to the PipelineRun status report at Checks tab - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:439 @ 05/02/26 05:20:48.181 (424ms)&#xA;&gt; Enter [AfterAll] when a new Component with specified custom branch is created - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:324 @ 05/02/26 05:20:48.181&#xA;&lt; Exit [AfterAll] when a new Component with specified custom branch is created - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:324 @ 05/02/26 05:20:48.248 (66ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:20:48.248&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:20:48.248 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is updated eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="20.796179576">
              <system-err>&gt; Enter [BeforeAll] when the PaC init branch is updated - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:454 @ 05/02/26 05:20:48.248&#xA;created file sha: a42d6fc88c22ecec68ff52e50972cdf4cb5d37a9&#xA;&lt; Exit [BeforeAll] when the PaC init branch is updated - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:454 @ 05/02/26 05:20:48.743 (495ms)&#xA;&gt; Enter [It] eventually leads to triggering another PipelineRun - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:464 @ 05/02/26 05:20:48.744&#xA;PipelineRun has not been created yet for the component build-e2e-gfsr/gh-test-custom-branch-wtuska&#xA;&lt; Exit [It] eventually leads to triggering another PipelineRun - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:464 @ 05/02/26 05:21:09.044 (20.301s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:21:09.044&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:21:09.044 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is updated should lead to a PaC init PR update [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.195993903">
              <system-err>&gt; Enter [It] should lead to a PaC init PR update - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:479 @ 05/02/26 05:21:09.045&#xA;&lt; Exit [It] should lead to a PaC init PR update - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:479 @ 05/02/26 05:21:09.241 (196ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:21:09.241&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:21:09.241 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is updated PipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="340.386152328">
              <system-err>&gt; Enter [It] PipelineRun should eventually finish - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:498 @ 05/02/26 05:21:09.241&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-mffm2 found for Component build-e2e-gfsr/gh-test-custom-branch-wtuska&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-mffm2 reason: ResolvingTaskRef&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-mffm2 reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-mffm2 reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-mffm2 reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-mffm2 reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-mffm2 reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-mffm2 reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-mffm2 reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-mffm2 reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-mffm2 reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-mffm2 reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-mffm2 reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-mffm2 reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-mffm2 reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-mffm2 reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-mffm2 reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-mffm2 reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-pull-request-mffm2 reason: Succeeded&#xA;&lt; Exit [It] PipelineRun should eventually finish - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:498 @ 05/02/26 05:26:49.627 (5m40.386s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:26:49.627&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:26:49.627 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is updated eventually leads to another update of a PR about the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="1.386317006">
              <system-err>&gt; Enter [It] eventually leads to another update of a PR about the PipelineRun status report at Checks tab - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:504 @ 05/02/26 05:26:49.628&#xA;expecting CheckRun status completed, got: in_progress&#xA;&lt; Exit [It] eventually leads to another update of a PR about the PipelineRun status report at Checks tab - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:504 @ 05/02/26 05:26:51.014 (1.386s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:26:51.014&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:26:51.014 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="23.738649532">
              <system-err>&gt; Enter [BeforeAll] when the PaC init branch is merged - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:520 @ 05/02/26 05:26:51.015&#xA;merged result sha: 70724eb8af44230cda044f2a59c0ab0c9256ca41&#xA;&lt; Exit [BeforeAll] when the PaC init branch is merged - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:520 @ 05/02/26 05:26:52.566 (1.551s)&#xA;&gt; Enter [It] eventually leads to triggering another PipelineRun - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:530 @ 05/02/26 05:26:52.566&#xA;PipelineRun has not been created yet for the component build-e2e-gfsr/gh-test-custom-branch-wtuska&#xA;&lt; Exit [It] eventually leads to triggering another PipelineRun - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:530 @ 05/02/26 05:27:14.753 (22.187s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:27:14.753&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:27:14.753 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="1060.323899535">
              <system-err>&gt; Enter [It] pipelineRun should eventually finish - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:546 @ 05/02/26 05:27:14.754&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl found for Component build-e2e-gfsr/gh-test-custom-branch-wtuska&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: ResolvingTaskRef&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: Running&#xA;PipelineRun has not been created yet for the Component build-e2e-gfsr/gh-test-custom-branch-wtuska&#xA;PipelineRun has not been created yet for the Component build-e2e-gfsr/gh-test-custom-branch-wtuska&#xA;PipelineRun has not been created yet for the Component build-e2e-gfsr/gh-test-custom-branch-wtuska&#xA;PipelineRun has not been created yet for the Component build-e2e-gfsr/gh-test-custom-branch-wtuska&#xA;PipelineRun has not been created yet for the Component build-e2e-gfsr/gh-test-custom-branch-wtuska&#xA;PipelineRun has not been created yet for the Component build-e2e-gfsr/gh-test-custom-branch-wtuska&#xA;PipelineRun has not been created yet for the Component build-e2e-gfsr/gh-test-custom-branch-wtuska&#xA;PipelineRun has not been created yet for the Component build-e2e-gfsr/gh-test-custom-branch-wtuska&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: Running&#xA;PipelineRun gh-test-custom-branch-wtuska-on-push-phtbl reason: Succeeded&#xA;&lt; Exit [It] pipelineRun should eventually finish - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:546 @ 05/02/26 05:44:55.077 (17m40.324s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:44:55.077&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:44:55.078 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged does not have expiration set [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.334882825">
              <system-err>&gt; Enter [It] does not have expiration set - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:552 @ 05/02/26 05:44:55.078&#xA;&lt; Exit [It] does not have expiration set - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:552 @ 05/02/26 05:44:55.413 (335ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:44:55.413&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:44:55.413 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged After updating image visibility to private, it should not trigger another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="122.332566665">
              <system-err>&gt; Enter [It] After updating image visibility to private, it should not trigger another PipelineRun - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:564 @ 05/02/26 05:44:55.413&#xA;waiting for one minute and expecting to not trigger a PipelineRun&#xA;&lt; Exit [It] After updating image visibility to private, it should not trigger another PipelineRun - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:564 @ 05/02/26 05:46:57.745 (2m2.332s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:46:57.746&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:46:57.746 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged image repo is updated to private [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.414639392">
              <system-err>&gt; Enter [It] image repo is updated to private - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:595 @ 05/02/26 05:46:57.747&#xA;&lt; Exit [It] image repo is updated to private - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:595 @ 05/02/26 05:46:58.161 (414ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:46:58.161&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:46:58.161 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged retrigger the pipeline manually [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged retriggered pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the component is removed related image repo and robot accounts deleted [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="9.557037644">
              <system-err>&gt; Enter [BeforeAll] when the component is removed - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:649 @ 05/02/26 05:46:58.162&#xA;&lt; Exit [BeforeAll] when the component is removed - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:649 @ 05/02/26 05:47:01.536 (3.374s)&#xA;&gt; Enter [It] related image repo and robot accounts deleted - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:661 @ 05/02/26 05:47:01.536&#xA;&lt; Exit [It] related image repo and robot accounts deleted - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:661 @ 05/02/26 05:47:07.719 (6.183s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:47:07.719&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:47:07.719 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the component is removed purge PR is created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="3.811664341">
              <system-err>&gt; Enter [It] purge PR is created successfully - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:679 @ 05/02/26 05:47:07.72&#xA;Found purge PR with id: 3&#xA;&lt; Exit [It] purge PR is created successfully - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:679 @ 05/02/26 05:47:07.933 (213ms)&#xA;&gt; Enter [AfterAll] PaC component build - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:101 @ 05/02/26 05:47:07.933&#xA;&lt; Exit [AfterAll] PaC component build - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:101 @ 05/02/26 05:47:11.531 (3.598s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:47:11.531&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/pac_build.go:28 @ 05/02/26 05:47:11.531 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-pipelines-suite Push to external registry] Post-release verification verifies that a Release CR should have been created in the dev namespace [release-pipelines, push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite Push to external registry] Post-release verification verifies that Release PipelineRun should eventually succeed [release-pipelines, push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite Push to external registry] Post-release verification tests if the image was pushed to quay [release-pipelines, push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite Push to external registry] Post-release verification verifies that a Release is marked as succeeded. [release-pipelines, push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace creates component with context directory go-component [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="passed" time="12.361770897">
              <system-err>&gt; Enter [BeforeAll] test pac with multiple components using same repository - /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:40 @ 05/02/26 05:06:21.891&#xA;&lt; Exit [BeforeAll] test pac with multiple components using same repository - /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:40 @ 05/02/26 05:06:23.978 (2.087s)&#xA;&gt; Enter [It] creates component with context directory go-component - /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:106 @ 05/02/26 05:06:23.979&#xA;Image repository for component go-component-seeoin in namespace build-e2e-wqrk do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [It] creates component with context directory go-component - /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:106 @ 05/02/26 05:06:34.252 (10.274s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:28 @ 05/02/26 05:06:34.253&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:28 @ 05/02/26 05:06:34.253 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace triggers a PipelineRun for component go-component-seeoin [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="passed" time="40.291870382">
              <system-err>&gt; Enter [It] triggers a PipelineRun for component go-component-seeoin - /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:125 @ 05/02/26 05:06:34.253&#xA;PipelineRun has not been created yet for the component build-e2e-wqrk/go-component-seeoin&#xA;PipelineRun has not been created yet for the component build-e2e-wqrk/go-component-seeoin&#xA;&lt; Exit [It] triggers a PipelineRun for component go-component-seeoin - /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:125 @ 05/02/26 05:07:14.545 (40.291s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:28 @ 05/02/26 05:07:14.545&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:28 @ 05/02/26 05:07:14.545 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace should lead to a PaC PR creation for component go-component-seeoin [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="passed" time="0.381511053">
              <system-err>&gt; Enter [It] should lead to a PaC PR creation for component go-component-seeoin - /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:140 @ 05/02/26 05:07:14.546&#xA;&lt; Exit [It] should lead to a PaC PR creation for component go-component-seeoin - /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:140 @ 05/02/26 05:07:14.927 (381ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:28 @ 05/02/26 05:07:14.927&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:28 @ 05/02/26 05:07:14.927 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace the PipelineRun should eventually finish successfully for component go-component-seeoin [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="passed" time="2074.405043984">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully for component go-component-seeoin - /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:159 @ 05/02/26 05:07:14.928&#xA;PipelineRun go-component-seeoin-on-pull-request-spsdd found for Component build-e2e-wqrk/go-component-seeoin&#xA;PipelineRun go-component-seeoin-on-pull-request-spsdd reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-spsdd reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-spsdd reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-spsdd reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-spsdd reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-spsdd reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-spsdd reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-spsdd reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-spsdd reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-spsdd reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-spsdd reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-spsdd reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-spsdd reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-spsdd reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-spsdd reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-spsdd reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-spsdd reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-spsdd reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-spsdd reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-spsdd reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-spsdd reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-spsdd reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-spsdd reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-spsdd reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-spsdd reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-spsdd reason: Failed&#xA;attempt 1/3: PipelineRun &#34;go-component-seeoin-on-pull-request-spsdd&#34; failed: &#xA; pod: go-component-seeoin-on-pull-request-spsdd-build-container-pod | init container: prepare&#xA;2026/05/02 05:09:26 Entrypoint initialization&#xA;&#xA; pod: go-component-seeoin-on-pull-request-spsdd-build-container-pod | init container: place-scripts&#xA;2026/05/02 05:09:27 Decoded script /tekton/scripts/script-1-w4kcf&#xA;2026/05/02 05:09:27 Decoded script /tekton/scripts/script-2-hwlz4&#xA;2026/05/02 05:09:27 Decoded script /tekton/scripts/script-3-qlbt5&#xA;2026/05/02 05:09:27 Decoded script /tekton/scripts/script-4-z2qgx&#xA;2026/05/02 05:09:27 Decoded script /tekton/scripts/script-5-gpvtc&#xA;&#xA;pod: go-component-seeoin-on-pull-request-spsdd-build-container-pod | container step-use-trusted-artifact: &#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-wqrk/go-component-seeoin&#xA;Executing: oras blob fetch --registry-config /tmp/use-oci.sh.HjR343/auth-RLnT2O.json quay.io/redhat-appstudio-qe/build-e2e-wqrk/go-component-seeoin@sha256:99d434308cb649f4aaacd231e4e17d1cdd21e7e4f622648eade721bf6a39c132 --output -&#xA;Restored artifact quay.io/redhat-appstudio-qe/build-e2e-wqrk/go-component-seeoin@sha256:99d434308cb649f4aaacd231e4e17d1cdd21e7e4f622648eade721bf6a39c132 to /var/workdir/source&#xA;WARN: artifact URI not provided, (given: =/var/workdir/cachi2)&#xA;&#xA;&#xA;pod: go-component-seeoin-on-pull-request-spsdd-build-container-pod | container step-build: &#xA;[2026-05-02T05:10:14,880610372+00:00] Validate context path&#xA;[2026-05-02T05:10:14,883805079+00:00] Update CA trust&#xA;[2026-05-02T05:10:14,884932514+00:00] Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;[2026-05-02T05:10:19,082964062+00:00] Prepare Dockerfile&#xA;Checking if /var/workdir/cachi2/output/bom.json exists.&#xA;Could not find prefetched sbom. No content_sets found for ICM&#xA;[2026-05-02T05:10:19,089709009+00:00] Prepare system (architecture: x86_64)&#xA;[2026-05-02T05:10:19,107391050+00:00] Setup prefetched&#xA;Trying to pull registry.access.redhat.com/ubi9/go-toolset:1.18.9-14...&#xA;Getting image source signatures&#xA;Checking if image destination supports signatures&#xA;Copying blob sha256:2a625e4afab51b49edb0e5f4ff37d8afbb20ec644ed1e68641358a6305557de3&#xA;Copying blob sha256:4a13c0e9217d70e608f2d5f5d3c5ffa6d9cd16908b3f83a7a97492d355d25a09&#xA;Copying blob sha256:0ab0ba77295aca9b12f463cb7198f0b8b6990b41151dbbd4e1b224fe85244b83&#xA;Copying blob sha256:e76793d6902ad1adb19ede3d720024cf0cd8427b3ff606554a4bcafba03dddf4&#xA;Copying config sha256:391a2eac28d98dc72726df1faa77db28f6899a77c91ad40f2bdad62baf041301&#xA;Writing manifest to image destination&#xA;Storing signatures&#xA;[2026-05-02T05:11:04,179323718+00:00] Unsetting proxy&#xA;{&#xA;  &#34;architecture&#34;: &#34;x86_64&#34;,&#xA;  &#34;build-date&#34;: &#34;2026-05-02T05:10:19Z&#34;,&#xA;  &#34;com.redhat.component&#34;: &#34;go-toolset-container&#34;,&#xA;  &#34;com.redhat.license_terms&#34;: &#34;https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI&#34;,&#xA;  &#34;description&#34;: &#34;Go Toolset available as a container is a base platform for building and running various Go applications and frameworks. Go is an easy to learn, powerful, statically typed language in the C/C++ tradition with garbage collection, concurrent programming support, and memory safety features.&#34;,&#xA;  &#34;distribution-scope&#34;: &#34;public&#34;,&#xA;  &#34;io.buildah.version&#34;: &#34;1.42.2&#34;,&#xA;  &#34;io.k8s.description&#34;: &#34;Go Toolset available as a container is a base platform for building and running various Go applications and frameworks. Go is an easy to learn, powerful, statically typed language in the C/C++ tradition with garbage collection, concurrent programming support, and memory safety features.&#34;,&#xA;  &#34;io.k8s.display-name&#34;: &#34;Go 1.18.9&#34;,&#xA;  &#34;io.openshift.expose-services&#34;: &#34;&#34;,&#xA;  &#34;io.openshift.s2i.scripts-url&#34;: &#34;image:///usr/libexec/s2i&#34;,&#xA;  &#34;io.openshift.tags&#34;: &#34;builder,golang,golang118,rh-golang118,go&#34;,&#xA;  &#34;io.s2i.scripts-url&#34;: &#34;image:///usr/libexec/s2i&#34;,&#xA;  &#34;maintainer&#34;: &#34;Red Hat, Inc.&#34;,&#xA;  &#34;name&#34;: &#34;rhel9/go-toolset&#34;,&#xA;  &#34;release&#34;: &#34;14&#34;,&#xA;  &#34;summary&#34;: &#34;Platform for building and running Go Applications&#34;,&#xA;  &#34;url&#34;: &#34;https://access.redhat.com/containers/#/registry.access.redhat.com/rhel9/go-toolset/images/1.18.9-14&#34;,&#xA;  &#34;vcs-ref&#34;: &#34;612aa521a3886be3be857538cd422f11c037afed&#34;,&#xA;  &#34;vcs-type&#34;: &#34;git&#34;,&#xA;  &#34;vendor&#34;: &#34;Red Hat, Inc.&#34;,&#xA;  &#34;version&#34;: &#34;1.18.9&#34;,&#xA;  &#34;org.opencontainers.image.revision&#34;: &#34;612aa521a3886be3be857538cd422f11c037afed&#34;,&#xA;  &#34;org.opencontainers.image.source&#34;: &#34;https://github.com/redhat-appstudio-qe/sample-multi-component&#34;,&#xA;  &#34;quay.expires-after&#34;: &#34;5d&#34;,&#xA;  &#34;org.opencontainers.image.created&#34;: &#34;2026-05-02T05:10:19Z&#34;&#xA;}&#xA;[2026-05-02T05:11:04,284030413+00:00] Register sub-man&#xA;Adding the entitlement to the build&#xA;[2026-05-02T05:11:04,287287897+00:00] Add secrets&#xA;[2026-05-02T05:11:04,444146425+00:00] Run buildah build&#xA;[2026-05-02T05:11:04,445313964+00:00] buildah build --volume /tmp/entitlement:/etc/pki/entitlement --security-opt=unmask=/proc/interrupts --label architecture=x86_64 --label vcs-type=git --label vcs-ref=612aa521a3886be3be857538cd422f11c037afed --label org.opencontainers.image.revision=612aa521a3886be3be857538cd422f11c037afed --label org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/sample-multi-component --label quay.expires-after=5d --label build-date=2026-05-02T05:10:19Z --label org.opencontainers.image.created=2026-05-02T05:10:19Z --annotation org.opencontainers.image.revision=612aa521a3886be3be857538cd422f11c037afed --annotation org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/sample-multi-component --annotation org.opencontainers.image.created=2026-05-02T05:10:19Z --tls-verify=true --no-cache --ulimit nofile=4096:4096 --http-proxy=false -f /tmp/Dockerfile.ChJkvh -t quay.io/redhat-appstudio-qe/build-e2e-wqrk/go-component-seeoin:on-pr-612aa521a3886be3be857538cd422f11c037afed . &#xA;STEP 1/10: FROM registry.access.redhat.com/ubi9/go-toolset:1.18.9-14&#xA;STEP 2/10: COPY . .&#xA;STEP 3/10: RUN go mod download&#xA;go: no module dependencies to download&#xA;STEP 4/10: RUN go build -o ./main&#xA;STEP 5/10: ENV PORT 8081&#xA;STEP 6/10: EXPOSE 8081&#xA;STEP 7/10: CMD [ &#34;./main&#34; ]&#xA;STEP 8/10: COPY labels.json /usr/share/buildinfo/labels.json&#xA;STEP 9/10: COPY labels.json /root/buildinfo/labels.json&#xA;STEP 10/10: LABEL &#34;architecture&#34;=&#34;x86_64&#34; &#34;vcs-type&#34;=&#34;git&#34; &#34;vcs-ref&#34;=&#34;612aa521a3886be3be857538cd422f11c037afed&#34; &#34;org.opencontainers.image.revision&#34;=&#34;612aa521a3886be3be857538cd422f11c037afed&#34; &#34;org.opencontainers.image.source&#34;=&#34;https://github.com/redhat-appstudio-qe/sample-multi-component&#34; &#34;quay.expires-after&#34;=&#34;5d&#34; &#34;build-date&#34;=&#34;2026-05-02T05:10:19Z&#34; &#34;org.opencontainers.image.created&#34;=&#34;2026-05-02T05:10:19Z&#34;&#xA;COMMIT quay.io/redhat-appstudio-qe/build-e2e-wqrk/go-component-seeoin:on-pr-612aa521a3886be3be857538cd422f11c037afed&#xA;--&gt; 1f34c83cfd85&#xA;Successfully tagged quay.io/redhat-appstudio-qe/build-e2e-wqrk/go-component-seeoin:on-pr-612aa521a3886be3be857538cd422f11c037afed&#xA;1f34c83cfd853f0efd1d96019d1cdc172651e3806e4f29d8bffe7492ea195f56&#xA;[2026-05-02T05:11:18,533783835+00:00] Unsetting proxy&#xA;[2026-05-02T05:11:18,534958860+00:00] Add metadata&#xA;Recording base image digests used&#xA;registry.access.redhat.com/ubi9/go-toolset:1.18.9-14 registry.access.redhat.com/ubi9/go-toolset:1.18.9-14@sha256:4e320bd8b62e406dfc567886aeab4914db125c73fe9ec308b306c72883101d51&#xA;Getting image source signatures&#xA;Copying blob sha256:49b9a86341b1d23461b06cdf188b9a40347417d5a715184d745c1f89b36a8434&#xA;Copying blob sha256:314640f419c581ddcac8f3618af39342a4571d5dc7a4e1f5b64d60f37e630b49&#xA;Copying blob sha256:a653a5ff4eaef6037f4f354414ab251ac7218d2d42fc8326743fc63ecf2cabd5&#xA;Copying blob sha256:db77b3de17313a3fab2620178c01a4ef8eb60cbe722a6e9390f3cbb1132a7d22&#xA;Copying blob sha256:d3f6a420cbadfb30033dc481690b39191ce6d2d841ccd54434c352f474ea54c3&#xA;Copying config sha256:1f34c83cfd853f0efd1d96019d1cdc172651e3806e4f29d8bffe7492ea195f56&#xA;Writing manifest to image destination&#xA;[2026-05-02T05:12:36,759777703+00:00] End build&#xA;&#xA;pod: go-component-seeoin-on-pull-request-spsdd-build-container-pod | container step-push: &#xA;[2026-05-02T05:12:37,521577237+00:00] Update CA trust&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;[2026-05-02T05:13:00,199742154+00:00] Convert image&#xA;[2026-05-02T05:13:00,200816472+00:00] Push image with unique tag&#xA;Pushing to quay.io/redhat-appstudio-qe/build-e2e-wqrk/go-component-seeoin:go-component-seeoin-on-pull-request-spsdd-build-container&#xA;[retry] executing: buildah push --format=docker --retry 3 --tls-verify=true quay.io/redhat-appstudio-qe/build-e2e-wqrk/go-component-seeoin:on-pr-612aa521a3886be3be857538cd422f11c037afed docker://quay.io/redhat-appstudio-qe/build-e2e-wqrk/go-component-seeoin:go-component-seeoin-on-pull-request-spsdd-build-container&#xA;Getting image source signatures&#xA;Copying blob sha256:49b9a86341b1d23461b06cdf188b9a40347417d5a715184d745c1f89b36a8434&#xA;Copying blob sha256:314640f419c581ddcac8f3618af39342a4571d5dc7a4e1f5b64d60f37e630b49&#xA;Copying blob sha256:a653a5ff4eaef6037f4f354414ab251ac7218d2d42fc8326743fc63ecf2cabd5&#xA;Copying blob sha256:db77b3de17313a3fab2620178c01a4ef8eb60cbe722a6e9390f3cbb1132a7d22&#xA;Copying blob sha256:d3f6a420cbadfb30033dc481690b39191ce6d2d841ccd54434c352f474ea54c3&#xA;&#xA;pod: go-component-seeoin-on-pull-request-spsdd-build-container-pod | container step-sbom-syft-generate: &#xA;&#xA;pod: go-component-seeoin-on-pull-request-spsdd-build-container-pod | container step-prepare-sboms: &#xA;&#xA;pod: go-component-seeoin-on-pull-request-spsdd-build-container-pod | container step-upload-sbom: &#xA;&#xA; pod: go-component-seeoin-on-pull-request-spsdd-clone-repository-pod | init container: prepare&#xA;2026/05/02 05:07:48 Entrypoint initialization&#xA;&#xA; pod: go-component-seeoin-on-pull-request-spsdd-clone-repository-pod | init container: place-scripts&#xA;2026/05/02 05:07:49 Decoded script /tekton/scripts/script-0-8q8rt&#xA;2026/05/02 05:07:49 Decoded script /tekton/scripts/script-1-hrt5z&#xA;&#xA;pod: go-component-seeoin-on-pull-request-spsdd-clone-repository-pod | container step-clone: &#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1777698482.0524802,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1777698482.9946427,&#34;caller&#34;:&#34;git/git.go:223&#34;,&#34;msg&#34;:&#34;Successfully cloned https://github.com/redhat-appstudio-qe/sample-multi-component @ 612aa521a3886be3be857538cd422f11c037afed (grafted, HEAD) in path /var/workdir/source&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1777698482.9946792,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1777698483.0180292,&#34;caller&#34;:&#34;git/git.go:277&#34;,&#34;msg&#34;:&#34;Successfully initialized and updated submodules in path /var/workdir/source&#34;}&#xA;Merge option disabled. Using checked-out revision 612aa521a3886be3be857538cd422f11c037afed directly.&#xA;&#xA;pod: go-component-seeoin-on-pull-request-spsdd-clone-repository-pod | container step-symlink-check: &#xA;Running symlink check&#xA;&#xA;pod: go-component-seeoin-on-pull-request-spsdd-clone-repository-pod | container step-create-trusted-artifact: &#xA;Prepared artifact from /var/workdir/source (sha256:99d434308cb649f4aaacd231e4e17d1cdd21e7e4f622648eade721bf6a39c132)&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-wqrk/go-component-seeoin&#xA;Executing: oras push --annotation=quay.expires-after=5d --registry-config /tmp/create-oci.sh.gJxiIh/auth-I7Mp80.json quay.io/redhat-appstudio-qe/build-e2e-wqrk/go-component-seeoin:on-pr-612aa521a3886be3be857538cd422f11c037afed.git SOURCE_ARTIFACT&#xA;Uploading 99d434308cb6 SOURCE_ARTIFACT&#xA;Uploaded  99d434308cb6 SOURCE_ARTIFACT&#xA;Pushed [registry] quay.io/redhat-appstudio-qe/build-e2e-wqrk/go-component-seeoin:on-pr-612aa521a3886be3be857538cd422f11c037afed.git&#xA;ArtifactType: application/vnd.unknown.artifact.v1&#xA;Digest: sha256:ad557a0edbad8c93c2a7c4e4d834f1d4ebf0029bbce422368f169e7957109b27&#xA;Artifacts created&#xA;&#xA;&#xA; pod: go-component-seeoin-on-pull-request-spsdd-init-pod | init container: prepare&#xA;2026/05/02 05:07:06 Entrypoint initialization&#xA;&#xA;pod: go-component-seeoin-on-pull-request-spsdd-init-pod | container step-init: &#xA;time=&#34;2026-05-02T05:07:43Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-05-02T05:07:43Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-05-02T05:07:43Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-05-02T05:07:43Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-05-02T05:07:43Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-05-02T05:07:43Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-02T05:07:43Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-05-02T05:07:43Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-05-02T05:07:43Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;&#xA; pod: go-component-seeoin-on-pullcb6001e3d37bf7710241234df3c16795-pod | init container: prepare&#xA;2026/05/02 05:08:12 Entrypoint initialization&#xA;&#xA; pod: go-component-seeoin-on-pullcb6001e3d37bf7710241234df3c16795-pod | init container: place-scripts&#xA;2026/05/02 05:08:12 Decoded script /tekton/scripts/script-0-g5hgq&#xA;2026/05/02 05:08:12 Decoded script /tekton/scripts/script-2-7d6p9&#xA;&#xA;pod: go-component-seeoin-on-pullcb6001e3d37bf7710241234df3c16795-pod | container step-skip-ta: &#xA;&#xA;pod: go-component-seeoin-on-pullcb6001e3d37bf7710241234df3c16795-pod | container step-use-trusted-artifact: &#xA;WARN: found skip file in /var/workdir/source&#xA;&#xA;&#xA;pod: go-component-seeoin-on-pullcb6001e3d37bf7710241234df3c16795-pod | container step-prefetch-dependencies: &#xA;Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;time=&#34;2026-05-02T05:09:10Z&#34; level=debug msg=&#34;Starting prefetch-dependencies&#34;&#xA;time=&#34;2026-05-02T05:09:10Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-02T05:09:10Z&#34; level=info msg=&#34;Not using package registry proxy because allow-package-registry-proxy is not set to `true` on the cluster level&#34; logger=PrefetchDependencies&#xA;time=&#34;2026-05-02T05:09:10Z&#34; level=info msg=&#34;[param] source-dir: /var/workdir/source&#34;&#xA;time=&#34;2026-05-02T05:09:10Z&#34; level=info msg=&#34;[param] output-dir: /var/workdir/cachi2/output&#34;&#xA;time=&#34;2026-05-02T05:09:10Z&#34; level=info msg=&#34;[param] sbom-format: spdx&#34;&#xA;time=&#34;2026-05-02T05:09:10Z&#34; level=info msg=&#34;[param] mode: strict&#34;&#xA;time=&#34;2026-05-02T05:09:10Z&#34; level=info msg=&#34;[param] output-dir-mount-point: /cachi2/output&#34;&#xA;time=&#34;2026-05-02T05:09:10Z&#34; level=info msg=&#34;[param] env-files: [/var/workdir/cachi2/cachi2.env /var/workdir/cachi2/prefetch.env /var/workdir/cachi2/prefetch-env.json]&#34;&#xA;time=&#34;2026-05-02T05:09:10Z&#34; level=info msg=&#34;[param] git-auth-directory: /workspace/git-basic-auth&#34;&#xA;time=&#34;2026-05-02T05:09:18Z&#34; level=info msg=&#34;hermeto [stdout] hermeto 0.50.1&#34; logger=CliExecutor&#xA;time=&#34;2026-05-02T05:09:19Z&#34; level=warning msg=&#34;No input provided; skipping prefetch-dependencies&#34; logger=PrefetchDependencies&#xA;time=&#34;2026-05-02T05:09:19Z&#34; level=debug msg=&#34;Finished prefetch-dependencies&#34;&#xA;&#xA;pod: go-component-seeoin-on-pullcb6001e3d37bf7710241234df3c16795-pod | container step-create-trusted-artifact: &#xA;WARN: found skip file in /var/workdir/source&#xA;WARN: found skip file in /var/workdir/cachi2&#xA;&#xA;New PipelineRun go-component-seeoin-on-pull-request-x28s6 found after retrigger for component build-e2e-wqrk/go-component-seeoin&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 found for Component build-e2e-wqrk/go-component-seeoin&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: ResolvingTaskRef&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun has not been created yet for the Component build-e2e-wqrk/go-component-seeoin&#xA;PipelineRun has not been created yet for the Component build-e2e-wqrk/go-component-seeoin&#xA;PipelineRun has not been created yet for the Component build-e2e-wqrk/go-component-seeoin&#xA;PipelineRun has not been created yet for the Component build-e2e-wqrk/go-component-seeoin&#xA;PipelineRun has not been created yet for the Component build-e2e-wqrk/go-component-seeoin&#xA;PipelineRun has not been created yet for the Component build-e2e-wqrk/go-component-seeoin&#xA;PipelineRun has not been created yet for the Component build-e2e-wqrk/go-component-seeoin&#xA;PipelineRun has not been created yet for the Component build-e2e-wqrk/go-component-seeoin&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Running&#xA;PipelineRun go-component-seeoin-on-pull-request-x28s6 reason: Succeeded&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully for component go-component-seeoin - /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:159 @ 05/02/26 05:41:49.332 (34m34.405s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:28 @ 05/02/26 05:41:49.333&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:28 @ 05/02/26 05:41:49.333 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace merging the PR should be successful [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="passed" time="1.5340558199999998">
              <system-err>&gt; Enter [It] merging the PR should be successful - /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:164 @ 05/02/26 05:41:49.333&#xA;merged result sha: 0c1d69a9ecf5f6e2d4aab583a1011ecfbe4a8b54 for PR #32809&#xA;&lt; Exit [It] merging the PR should be successful - /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:164 @ 05/02/26 05:41:50.867 (1.534s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:28 @ 05/02/26 05:41:50.867&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:28 @ 05/02/26 05:41:50.867 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace leads to triggering on push PipelineRun [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="passed" time="20.458777916">
              <system-err>&gt; Enter [It] leads to triggering on push PipelineRun - /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:174 @ 05/02/26 05:41:50.868&#xA;Push PipelineRun has not been created yet for the component build-e2e-wqrk/go-component-seeoin&#xA;&lt; Exit [It] leads to triggering on push PipelineRun - /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:174 @ 05/02/26 05:42:11.326 (20.458s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:28 @ 05/02/26 05:42:11.326&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:28 @ 05/02/26 05:42:11.326 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace creates component with context directory python-component [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="passed" time="10.137817071">
              <system-err>&gt; Enter [It] creates component with context directory python-component - /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:106 @ 05/02/26 05:42:11.327&#xA;Image repository for component python-component-sukmsc in namespace build-e2e-wqrk do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [It] creates component with context directory python-component - /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:106 @ 05/02/26 05:42:21.464 (10.137s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:28 @ 05/02/26 05:42:21.465&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:28 @ 05/02/26 05:42:21.465 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace triggers a PipelineRun for component python-component-sukmsc [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="passed" time="20.285030356">
              <system-err>&gt; Enter [It] triggers a PipelineRun for component python-component-sukmsc - /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:125 @ 05/02/26 05:42:21.465&#xA;PipelineRun has not been created yet for the component build-e2e-wqrk/python-component-sukmsc&#xA;&lt; Exit [It] triggers a PipelineRun for component python-component-sukmsc - /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:125 @ 05/02/26 05:42:41.75 (20.285s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:28 @ 05/02/26 05:42:41.75&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:28 @ 05/02/26 05:42:41.75 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace should lead to a PaC PR creation for component python-component-sukmsc [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="passed" time="0.344853383">
              <system-err>&gt; Enter [It] should lead to a PaC PR creation for component python-component-sukmsc - /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:140 @ 05/02/26 05:42:41.751&#xA;&lt; Exit [It] should lead to a PaC PR creation for component python-component-sukmsc - /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:140 @ 05/02/26 05:42:42.095 (345ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:28 @ 05/02/26 05:42:42.095&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:28 @ 05/02/26 05:42:42.096 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace the PipelineRun should eventually finish successfully for component python-component-sukmsc [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="failed" time="1408.029929522">
              <failure message="Expected success, but got an error:&#xA;    &lt;*errors.errorString | 0xc001502b20&gt;: &#xA;    &#xA;     pod: python-component-sukmsc-on-591f02614276501c9909e28298413f3d-pod | init container: prepare&#xA;    2026/05/02 06:01:15 Entrypoint initialization&#xA;    &#xA;     pod: python-component-sukmsc-on-591f02614276501c9909e28298413f3d-pod | init container: place-scripts&#xA;    2026/05/02 06:01:15 Decoded script /tekton/scripts/script-0-42c8p&#xA;    2026/05/02 06:01:15 Decoded script /tekton/scripts/script-1-clsx6&#xA;    &#xA;    pod: python-component-sukmsc-on-591f02614276501c9909e28298413f3d-pod | container step-clone: &#xA;    INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;    {&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1777701678.9782343,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;    {&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1777701679.423236,&#34;caller&#34;:&#34;git/git.go:223&#34;,&#34;msg&#34;:&#34;Successfully cloned https://github.com/redhat-appstudio-qe/sample-multi-component @ 9a58fff0b20b171aa9240228699291a7c9c1b6fd (grafted, HEAD) in path /var/workdir/source&#34;}&#xA;    {&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1777701679.4232862,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;    {&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1777701679.4468265,&#34;caller&#34;:&#34;git/git.go:277&#34;,&#34;msg&#34;:&#34;Successfully initialized and updated submodules in path /var/workdir/source&#34;}&#xA;    Merge option disabled. Using checked-out revision 9a58fff0b20b171aa9240228699291a7c9c1b6fd directly.&#xA;    &#xA;    pod: python-component-sukmsc-on-591f02614276501c9909e28298413f3d-pod | container step-symlink-check: &#xA;    Running symlink check&#xA;    &#xA;    pod: python-component-sukmsc-on-591f02614276501c9909e28298413f3d-pod | container step-create-trusted-artifact: &#xA;    Prepared artifact from /var/workdir/source (sha256:30a0bd277a19ad7be874275280017ea11cf53bbb756ca66fd1cdcd2fa0c312c1)&#xA;    Using token for quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc&#xA;    Executing: oras push --annotation=quay.expires-after=5d --registry-config /tmp/create-oci.sh.J0N6ty/auth-CgZpio.json quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-9a58fff0b20b171aa9240228699291a7c9c1b6fd.git SOURCE_ARTIFACT&#xA;    Uploading 30a0bd277a19 SOURCE_ARTIFACT&#xA;    Uploaded  30a0bd277a19 SOURCE_ARTIFACT&#xA;    Pushed [registry] quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-9a58fff0b20b171aa9240228699291a7c9c1b6fd.git&#xA;    ArtifactType: application/vnd.unknown.artifact.v1&#xA;    Digest: sha256:29b0286379e2717b11864360450387a73e9986f6be7c3627aab5854f910f9a93&#xA;    Artifacts created&#xA;    &#xA;    &#xA;     pod: python-component-sukmsc-on-7390bf2e487a3b4c4aee6988d7d2b712-pod | init container: prepare&#xA;    2026/05/02 06:02:02 Entrypoint initialization&#xA;    &#xA;     pod: python-component-sukmsc-on-7390bf2e487a3b4c4aee6988d7d2b712-pod | init container: place-scripts&#xA;    2026/05/02 06:02:03 Decoded script /tekton/scripts/script-1-wknqh&#xA;    2026/05/02 06:02:03 Decoded script /tekton/scripts/script-2-rhf2s&#xA;    2026/05/02 06:02:03 Decoded script /tekton/scripts/script-3-xkm58&#xA;    2026/05/02 06:02:03 Decoded script /tekton/scripts/script-4-hkg9r&#xA;    2026/05/02 06:02:03 Decoded script /tekton/scripts/script-5-n82hr&#xA;    &#xA;    pod: python-component-sukmsc-on-7390bf2e487a3b4c4aee6988d7d2b712-pod | container step-use-trusted-artifact: &#xA;    Using token for quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc&#xA;    Executing: oras blob fetch --registry-config /tmp/use-oci.sh.OztHxz/auth-Sp4x4T.json quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc@sha256:30a0bd277a19ad7be874275280017ea11cf53bbb756ca66fd1cdcd2fa0c312c1 --output -&#xA;    Restored artifact quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc@sha256:30a0bd277a19ad7be874275280017ea11cf53bbb756ca66fd1cdcd2fa0c312c1 to /var/workdir/source&#xA;    WARN: artifact URI not provided, (given: =/var/workdir/cachi2)&#xA;    &#xA;    &#xA;    pod: python-component-sukmsc-on-7390bf2e487a3b4c4aee6988d7d2b712-pod | container step-build: &#xA;    [2026-05-02T06:02:08,343082023+00:00] Validate context path&#xA;    [2026-05-02T06:02:08,346510359+00:00] Update CA trust&#xA;    [2026-05-02T06:02:08,347544486+00:00] Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;    &#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;    [2026-05-02T06:02:12,240664532+00:00] Prepare Dockerfile&#xA;    Checking if /var/workdir/cachi2/output/bom.json exists.&#xA;    Could not find prefetched sbom. No content_sets found for ICM&#xA;    [2026-05-02T06:02:12,248230526+00:00] Prepare system (architecture: x86_64)&#xA;    [2026-05-02T06:02:12,264402475+00:00] Setup prefetched&#xA;    Trying to pull registry.access.redhat.com/ubi9/python-39:1-117.1684741281...&#xA;    Getting image source signatures&#xA;    Checking if image destination supports signatures&#xA;    Copying blob sha256:8a2e9815396eaa57b0dfe27b2dfc442417f06aa70974c358f198980b533c7942&#xA;    Copying blob sha256:5465449a2ea5d8a7e05fa498c8ba35f0ce7714b0ad37e716961fca17dfa1ef13&#xA;    Copying blob sha256:085efe85e9dfb0b3d5d2392e4b78660a3091bf1ded336315117a627fbdd0567d&#xA;    Copying blob sha256:a07d808ddf4404b3885fef6100142a973cc667b2c3c4abcf4db96508795b1efb&#xA;    Copying config sha256:45c8f23c11bb64f238236aaf5cbe05595778e1d4fb6c06109c6fcc0a6b57a45b&#xA;    Writing manifest to image destination&#xA;    Storing signatures&#xA;    [2026-05-02T06:02:42,835630513+00:00] Unsetting proxy&#xA;    {&#xA;      &#34;architecture&#34;: &#34;x86_64&#34;,&#xA;      &#34;build-date&#34;: &#34;2026-05-02T06:02:12Z&#34;,&#xA;      &#34;com.redhat.component&#34;: &#34;python-39-container&#34;,&#xA;      &#34;com.redhat.license_terms&#34;: &#34;https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI&#34;,&#xA;      &#34;description&#34;: &#34;Python 3.9 available as container is a base platform for building and running various Python 3.9 applications and frameworks. Python is an easy to learn, powerful programming language. It has efficient high-level data structures and a simple but effective approach to object-oriented programming. Python&#39;s elegant syntax and dynamic typing, together with its interpreted nature, make it an ideal language for scripting and rapid application development in many areas on most platforms.&#34;,&#xA;      &#34;distribution-scope&#34;: &#34;public&#34;,&#xA;      &#34;io.buildah.version&#34;: &#34;1.42.2&#34;,&#xA;      &#34;io.buildpacks.stack.id&#34;: &#34;com.redhat.stacks.ubi9-python-39&#34;,&#xA;      &#34;io.k8s.description&#34;: &#34;Python 3.9 available as container is a base platform for building and running various Python 3.9 applications and frameworks. Python is an easy to learn, powerful programming language. It has efficient high-level data structures and a simple but effective approach to object-oriented programming. Python&#39;s elegant syntax and dynamic typing, together with its interpreted nature, make it an ideal language for scripting and rapid application development in many areas on most platforms.&#34;,&#xA;      &#34;io.k8s.display-name&#34;: &#34;Python 3.9&#34;,&#xA;      &#34;io.openshift.expose-services&#34;: &#34;8080:http&#34;,&#xA;      &#34;io.openshift.s2i.scripts-url&#34;: &#34;image:///usr/libexec/s2i&#34;,&#xA;      &#34;io.openshift.tags&#34;: &#34;builder,python,python39,python-39,rh-python39&#34;,&#xA;      &#34;io.s2i.scripts-url&#34;: &#34;image:///usr/libexec/s2i&#34;,&#xA;      &#34;maintainer&#34;: &#34;SoftwareCollections.org &lt;sclorg@redhat.com&gt;&#34;,&#xA;      &#34;name&#34;: &#34;ubi9/python-39&#34;,&#xA;      &#34;release&#34;: &#34;117.1684741281&#34;,&#xA;      &#34;summary&#34;: &#34;Platform for building and running Python 3.9 applications&#34;,&#xA;      &#34;url&#34;: &#34;https://access.redhat.com/containers/#/registry.access.redhat.com/ubi9/python-39/images/1-117.1684741281&#34;,&#xA;      &#34;usage&#34;: &#34;s2i build https://github.com/sclorg/s2i-python-container.git --context-dir=3.9/test/setup-test-app/ ubi9/python-39 python-sample-app&#34;,&#xA;      &#34;vcs-ref&#34;: &#34;9a58fff0b20b171aa9240228699291a7c9c1b6fd&#34;,&#xA;      &#34;vcs-type&#34;: &#34;git&#34;,&#xA;      &#34;vendor&#34;: &#34;Red Hat, Inc.&#34;,&#xA;      &#34;version&#34;: &#34;1&#34;,&#xA;      &#34;org.opencontainers.image.revision&#34;: &#34;9a58fff0b20b171aa9240228699291a7c9c1b6fd&#34;,&#xA;      &#34;org.opencontainers.image.source&#34;: &#34;https://github.com/redhat-appstudio-qe/sample-multi-component&#34;,&#xA;      &#34;quay.expires-after&#34;: &#34;5d&#34;,&#xA;      &#34;org.opencontainers.image.created&#34;: &#34;2026-05-02T06:02:12Z&#34;&#xA;    }&#xA;    [2026-05-02T06:02:42,939251206+00:00] Register sub-man&#xA;    Adding the entitlement to the build&#xA;    [2026-05-02T06:02:42,942342755+00:00] Add secrets&#xA;    [2026-05-02T06:02:42,958124691+00:00] Run buildah build&#xA;    [2026-05-02T06:02:42,959167684+00:00] buildah build --volume /tmp/entitlement:/etc/pki/entitlement --security-opt=unmask=/proc/interrupts --label architecture=x86_64 --label vcs-type=git --label vcs-ref=9a58fff0b20b171aa9240228699291a7c9c1b6fd --label org.opencontainers.image.revision=9a58fff0b20b171aa9240228699291a7c9c1b6fd --label org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/sample-multi-component --label quay.expires-after=5d --label build-date=2026-05-02T06:02:12Z --label org.opencontainers.image.created=2026-05-02T06:02:12Z --annotation org.opencontainers.image.revision=9a58fff0b20b171aa9240228699291a7c9c1b6fd --annotation org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/sample-multi-component --annotation org.opencontainers.image.created=2026-05-02T06:02:12Z --tls-verify=true --no-cache --ulimit nofile=4096:4096 --http-proxy=false -f /tmp/Dockerfile.xk9LA0 -t quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-9a58fff0b20b171aa9240228699291a7c9c1b6fd . &#xA;    STEP 1/10: FROM registry.access.redhat.com/ubi9/python-39:1-117.1684741281&#xA;    STEP 2/10: EXPOSE 8081/tcp&#xA;    STEP 3/10: ENV FLASK_PORT=8081&#xA;    STEP 4/10: WORKDIR /projects&#xA;    STEP 5/10: COPY . .&#xA;    STEP 6/10: RUN   if [ -f requirements.txt ];     then pip install -r requirements.txt;   elif [ `ls -1q *.txt | wc -l` == 1 ];     then pip install -r *.txt;   fi&#xA;    Collecting Flask==2.3.3&#xA;      Downloading flask-2.3.3-py3-none-any.whl (96 kB)&#xA;    Collecting blinker&gt;=1.6.2&#xA;      Downloading blinker-1.9.0-py3-none-any.whl (8.5 kB)&#xA;    Collecting importlib-metadata&gt;=3.6.0&#xA;      Downloading importlib_metadata-8.7.1-py3-none-any.whl (27 kB)&#xA;    Collecting Jinja2&gt;=3.1.2&#xA;      Downloading jinja2-3.1.6-py3-none-any.whl (134 kB)&#xA;    Collecting itsdangerous&gt;=2.1.2&#xA;      Downloading itsdangerous-2.2.0-py3-none-any.whl (16 kB)&#xA;    Collecting click&gt;=8.1.3&#xA;      Downloading click-8.1.8-py3-none-any.whl (98 kB)&#xA;    Collecting Werkzeug&gt;=2.3.7&#xA;      Downloading werkzeug-3.1.8-py3-none-any.whl (226 kB)&#xA;    Collecting zipp&gt;=3.20&#xA;      Downloading zipp-3.23.1-py3-none-any.whl (10 kB)&#xA;    Collecting MarkupSafe&gt;=2.0&#xA;      Downloading markupsafe-3.0.3-cp39-cp39-manylinux2014_x86_64.manylinux_2_17_x86_64.manylinux_2_28_x86_64.whl (20 kB)&#xA;    Installing collected packages: zipp, MarkupSafe, Werkzeug, Jinja2, itsdangerous, importlib-metadata, click, blinker, Flask&#xA;    Successfully installed Flask-2.3.3 Jinja2-3.1.6 MarkupSafe-3.0.3 Werkzeug-3.1.8 blinker-1.9.0 click-8.1.8 importlib-metadata-8.7.1 itsdangerous-2.2.0 zipp-3.23.1&#xA;    WARNING: You are using pip version 21.3.1; however, version 26.0.1 is available.&#xA;    You should consider upgrading via the &#39;/opt/app-root/bin/python3.9 -m pip install --upgrade pip&#39; command.&#xA;    STEP 7/10: CMD [ &#34;python&#34;, &#34;./app.py&#34; ]&#xA;    STEP 8/10: COPY labels.json /usr/share/buildinfo/labels.json&#xA;    STEP 9/10: COPY labels.json /root/buildinfo/labels.json&#xA;    STEP 10/10: LABEL &#34;architecture&#34;=&#34;x86_64&#34; &#34;vcs-type&#34;=&#34;git&#34; &#34;vcs-ref&#34;=&#34;9a58fff0b20b171aa9240228699291a7c9c1b6fd&#34; &#34;org.opencontainers.image.revision&#34;=&#34;9a58fff0b20b171aa9240228699291a7c9c1b6fd&#34; &#34;org.opencontainers.image.source&#34;=&#34;https://github.com/redhat-appstudio-qe/sample-multi-component&#34; &#34;quay.expires-after&#34;=&#34;5d&#34; &#34;build-date&#34;=&#34;2026-05-02T06:02:12Z&#34; &#34;org.opencontainers.image.created&#34;=&#34;2026-05-02T06:02:12Z&#34;&#xA;    COMMIT quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-9a58fff0b20b171aa9240228699291a7c9c1b6fd&#xA;    --&gt; ca84e75f124f&#xA;    Successfully tagged quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-9a58fff0b20b171aa9240228699291a7c9c1b6fd&#xA;    ca84e75f124f87650d18f671c13714546ff668228556de54b4b53120968860cb&#xA;    [2026-05-02T06:02:48,359474036+00:00] Unsetting proxy&#xA;    [2026-05-02T06:02:48,360843489+00:00] Add metadata&#xA;    Recording base image digests used&#xA;    registry.access.redhat.com/ubi9/python-39:1-117.1684741281 registry.access.redhat.com/ubi9/python-39:1-117.1684741281@sha256:40a58935b9c22664927b22bf256f53a3d744ddb7316f3af18061099e199526ee&#xA;    Getting image source signatures&#xA;    Copying blob sha256:a3551a1f52c5788c9e4e19e7458ecd57b93554fb4cad127b13d61c73c13775e4&#xA;    Copying blob sha256:d661a108c347030c3ef626a0e0020e084fba1e1023193824f5395fa90ef40bde&#xA;    Copying blob sha256:d93d3cc0bc0c5ed9655bcdcf31183ed0b570076c0e6a13e0d7cb907d0b877b00&#xA;    Copying blob sha256:629980bfa23ec05ce5acc61ed2866ddf8713f40bb2a61f0850395082f1457220&#xA;    Copying blob sha256:bc8a0003b3470be53e5cf295daf38c287d3f20ab90e8f5c2b6f17406b158d323&#xA;    Copying config sha256:ca84e75f124f87650d18f671c13714546ff668228556de54b4b53120968860cb&#xA;    Writing manifest to image destination&#xA;    [2026-05-02T06:03:22,157574695+00:00] End build&#xA;    &#xA;    pod: python-component-sukmsc-on-7390bf2e487a3b4c4aee6988d7d2b712-pod | container step-push: &#xA;    [2026-05-02T06:03:22,816503114+00:00] Update CA trust&#xA;    INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;    &#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;    [2026-05-02T06:03:43,886667723+00:00] Convert image&#xA;    [2026-05-02T06:03:43,887746209+00:00] Push image with unique tag&#xA;    Pushing to quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:python-component-sukmsc-on-pull-request-2vxmt-build-container&#xA;    [retry] executing: buildah push --format=docker --retry 3 --tls-verify=true quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-9a58fff0b20b171aa9240228699291a7c9c1b6fd docker://quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:python-component-sukmsc-on-pull-request-2vxmt-build-container&#xA;    Getting image source signatures&#xA;    Copying blob sha256:a3551a1f52c5788c9e4e19e7458ecd57b93554fb4cad127b13d61c73c13775e4&#xA;    Copying blob sha256:bc8a0003b3470be53e5cf295daf38c287d3f20ab90e8f5c2b6f17406b158d323&#xA;    Copying blob sha256:d93d3cc0bc0c5ed9655bcdcf31183ed0b570076c0e6a13e0d7cb907d0b877b00&#xA;    Copying blob sha256:629980bfa23ec05ce5acc61ed2866ddf8713f40bb2a61f0850395082f1457220&#xA;    Copying blob sha256:d661a108c347030c3ef626a0e0020e084fba1e1023193824f5395fa90ef40bde&#xA;    &#xA;    pod: python-component-sukmsc-on-7390bf2e487a3b4c4aee6988d7d2b712-pod | container step-sbom-syft-generate: &#xA;    &#xA;    pod: python-component-sukmsc-on-7390bf2e487a3b4c4aee6988d7d2b712-pod | container step-prepare-sboms: &#xA;    &#xA;    pod: python-component-sukmsc-on-7390bf2e487a3b4c4aee6988d7d2b712-pod | container step-upload-sbom: &#xA;    &#xA;     pod: python-component-sukmsc-on-pull-request-2vxmt-init-pod | init container: prepare&#xA;    2026/05/02 06:01:09 Entrypoint initialization&#xA;    &#xA;    pod: python-component-sukmsc-on-pull-request-2vxmt-init-pod | container step-init: &#xA;    time=&#34;2026-05-02T06:01:13Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;    time=&#34;2026-05-02T06:01:13Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;    time=&#34;2026-05-02T06:01:13Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;    time=&#34;2026-05-02T06:01:13Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;    time=&#34;2026-05-02T06:01:13Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;    time=&#34;2026-05-02T06:01:13Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;    time=&#34;2026-05-02T06:01:13Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;    time=&#34;2026-05-02T06:01:13Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;    time=&#34;2026-05-02T06:01:13Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;    &#xA;    {&#xA;        s: &#34;\n pod: python-component-sukmsc-on-591f02614276501c9909e28298413f3d-pod | init container: prepare\n2026/05/02 06:01:15 Entrypoint initialization\n\n pod: python-component-sukmsc-on-591f02614276501c9909e28298413f3d-pod | init container: place-scripts\n2026/05/02 06:01:15 Decoded script /tekton/scripts/script-0-42c8p\n2026/05/02 06:01:15 Decoded script /tekton/scripts/script-1-clsx6\n\npod: python-component-sukmsc-on-591f02614276501c9909e28298413f3d-pod | container step-clone: \nINFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt\n{\&#34;level\&#34;:\&#34;info\&#34;,\&#34;ts\&#34;:1777701678.9782343,\&#34;caller\&#34;:\&#34;git/git.go:394\&#34;,\&#34;msg\&#34;:\&#34;Retrying operation (attempt 1)\&#34;}\n{\&#34;level\&#34;:\&#34;info\&#34;,\&#34;ts\&#34;:1777701679.423236,\&#34;caller\&#34;:\&#34;git/git.go:223\&#34;,\&#34;msg\&#34;:\&#34;Successfully cloned https://github.com/redhat-appstudio-qe/sample-multi-component @ 9a58fff0b20b171aa9240228699291a7c9c1b6fd (grafted, HEAD) in path /var/workdir/source\&#34;}\n{\&#34;level\&#34;:\&#34;info\&#34;,\&#34;ts\&#34;:1777701679.4232862,\&#34;caller\&#34;:\&#34;git/git.go:394\&#34;,\&#34;msg\&#34;:\&#34;Retrying operation (attempt 1)\&#34;}\n{\&#34;level\&#34;:\&#34;info\&#34;,\&#34;ts\&#34;:1777701679.4468265,\&#34;caller\&#34;:\&#34;git/git.go:277\&#34;,\&#34;msg\&#34;:\&#34;Successfully initialized and updated submodules in path /var/workdir/source\&#34;}\nMerge option disabled. Using checked-out revision 9a58fff0b20b171aa9240228699291a7c9c1b6fd directly.\n\npod: python-component-sukmsc-on-591f02614276501c9909e28298413f3d-pod | container step-symlink-check: \nRunning symlink check\n\npod: python-component-sukmsc-on-591f02614276501c9909e28298413f3d-pod | container step-create-trusted-artifact: \nPrepared artifact from /var/workdir/source (sha256:30a0bd277a19ad7be874275280017ea11cf53bbb756ca66fd1cdcd2fa0c312c1)\nUsing token for quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc\nExecuting: oras push --annotation=quay.expires-after=5d --registry-config /tmp/create-oci.sh.J0N6ty/auth-CgZpio.json quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-9a58fff0b20b171aa9240228699291a7c9c1b6fd.git SOURCE_ARTIFACT\nUploading 30a0bd277a19 SOURCE_ARTIFACT\nUploaded  30a0bd277a19 SOURCE_ARTIFACT\nPushed [registry] quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-9a58fff0b20b171aa9240228699291a7c9c1b6fd.git\nArtifactType: application/vnd.unknown.artifact.v1\nDigest: sha256:29b0286379e2717b11864360450387a73e9986f6be7c3627aab5854f910f9a93\nArtifacts created\n\n\n pod: python-component-sukmsc-on-7390bf2e487a3b4c4aee6988d7d2b712-pod | init container: prepare\n2026/05/02 06:02:02 Entrypoint initialization\n\n pod: python-component-sukmsc-on-7390bf2e487a3b4c4aee6988d7d2b712-pod | init container: place-scripts\n2026/05/02 06:02:03 Decoded script /tekton/scripts/script-1-wknqh\n2026/05/02 06:02:03 Decoded script /tekton/scripts/script-2-rhf2s\n2026/05/02 06:02:03 Decoded script /tekton/scripts/script-3-xkm58\n2026/05/02 06:02:03 Decoded script /tekton/scripts/script-4-hkg9r\n2026/05/02 06:02:03 Decoded script /tekton/scripts/script-5-n82hr\n\npod: python-component-sukmsc-on-7390bf2e487a3b4c4aee6988d7d2b712-pod | container step-use-trusted-artifact: \nUsing token for quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc\nExecuting: oras blob fetch --registry-config /tmp/use-oci.sh.OztHxz/auth-Sp4x4T.json quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc@sha256:30a0bd277a19ad7be874275280017ea11cf53bbb756ca66fd1cdcd2fa0c312c1 --output -\nRestored artifact quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc@sha256:30a0bd277a19ad7be874275280017ea11cf53bbb756ca66fd1cdcd2fa0c312c1 to /var/workdir/source\nWARN: artifact URI not provided, (given: =/var/workdir/cachi2)\n\n\npod: python-component-sukmsc-on-7390bf2e487a3b4c4aee6988d7d2b712-pod | container step-build: \n[2026-05-02T06:02:08,343082023+00:00] Validate context path\n[2026-05-02T06:02:08,346510359+00:00] Update CA trust\n[2026-05-02T06:02:08,347544486+00:00] Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt\n&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; ...&#xA;&#xA;Gomega truncated this representation as it exceeds &#39;format.MaxLength&#39;.&#xA;Consider having the object provide a custom &#39;GomegaStringer&#39; representation&#xA;or adjust the parameters in Gomega&#39;s &#39;format&#39; package.&#xA;&#xA;Learn more here: https://onsi.github.io/gomega/#adjusting-output&#xA;" type="failed">[FAILED] Expected success, but got an error:&#xA;    &lt;*errors.errorString | 0xc001502b20&gt;: &#xA;    &#xA;     pod: python-component-sukmsc-on-591f02614276501c9909e28298413f3d-pod | init container: prepare&#xA;    2026/05/02 06:01:15 Entrypoint initialization&#xA;    &#xA;     pod: python-component-sukmsc-on-591f02614276501c9909e28298413f3d-pod | init container: place-scripts&#xA;    2026/05/02 06:01:15 Decoded script /tekton/scripts/script-0-42c8p&#xA;    2026/05/02 06:01:15 Decoded script /tekton/scripts/script-1-clsx6&#xA;    &#xA;    pod: python-component-sukmsc-on-591f02614276501c9909e28298413f3d-pod | container step-clone: &#xA;    INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;    {&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1777701678.9782343,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;    {&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1777701679.423236,&#34;caller&#34;:&#34;git/git.go:223&#34;,&#34;msg&#34;:&#34;Successfully cloned https://github.com/redhat-appstudio-qe/sample-multi-component @ 9a58fff0b20b171aa9240228699291a7c9c1b6fd (grafted, HEAD) in path /var/workdir/source&#34;}&#xA;    {&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1777701679.4232862,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;    {&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1777701679.4468265,&#34;caller&#34;:&#34;git/git.go:277&#34;,&#34;msg&#34;:&#34;Successfully initialized and updated submodules in path /var/workdir/source&#34;}&#xA;    Merge option disabled. Using checked-out revision 9a58fff0b20b171aa9240228699291a7c9c1b6fd directly.&#xA;    &#xA;    pod: python-component-sukmsc-on-591f02614276501c9909e28298413f3d-pod | container step-symlink-check: &#xA;    Running symlink check&#xA;    &#xA;    pod: python-component-sukmsc-on-591f02614276501c9909e28298413f3d-pod | container step-create-trusted-artifact: &#xA;    Prepared artifact from /var/workdir/source (sha256:30a0bd277a19ad7be874275280017ea11cf53bbb756ca66fd1cdcd2fa0c312c1)&#xA;    Using token for quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc&#xA;    Executing: oras push --annotation=quay.expires-after=5d --registry-config /tmp/create-oci.sh.J0N6ty/auth-CgZpio.json quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-9a58fff0b20b171aa9240228699291a7c9c1b6fd.git SOURCE_ARTIFACT&#xA;    Uploading 30a0bd277a19 SOURCE_ARTIFACT&#xA;    Uploaded  30a0bd277a19 SOURCE_ARTIFACT&#xA;    Pushed [registry] quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-9a58fff0b20b171aa9240228699291a7c9c1b6fd.git&#xA;    ArtifactType: application/vnd.unknown.artifact.v1&#xA;    Digest: sha256:29b0286379e2717b11864360450387a73e9986f6be7c3627aab5854f910f9a93&#xA;    Artifacts created&#xA;    &#xA;    &#xA;     pod: python-component-sukmsc-on-7390bf2e487a3b4c4aee6988d7d2b712-pod | init container: prepare&#xA;    2026/05/02 06:02:02 Entrypoint initialization&#xA;    &#xA;     pod: python-component-sukmsc-on-7390bf2e487a3b4c4aee6988d7d2b712-pod | init container: place-scripts&#xA;    2026/05/02 06:02:03 Decoded script /tekton/scripts/script-1-wknqh&#xA;    2026/05/02 06:02:03 Decoded script /tekton/scripts/script-2-rhf2s&#xA;    2026/05/02 06:02:03 Decoded script /tekton/scripts/script-3-xkm58&#xA;    2026/05/02 06:02:03 Decoded script /tekton/scripts/script-4-hkg9r&#xA;    2026/05/02 06:02:03 Decoded script /tekton/scripts/script-5-n82hr&#xA;    &#xA;    pod: python-component-sukmsc-on-7390bf2e487a3b4c4aee6988d7d2b712-pod | container step-use-trusted-artifact: &#xA;    Using token for quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc&#xA;    Executing: oras blob fetch --registry-config /tmp/use-oci.sh.OztHxz/auth-Sp4x4T.json quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc@sha256:30a0bd277a19ad7be874275280017ea11cf53bbb756ca66fd1cdcd2fa0c312c1 --output -&#xA;    Restored artifact quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc@sha256:30a0bd277a19ad7be874275280017ea11cf53bbb756ca66fd1cdcd2fa0c312c1 to /var/workdir/source&#xA;    WARN: artifact URI not provided, (given: =/var/workdir/cachi2)&#xA;    &#xA;    &#xA;    pod: python-component-sukmsc-on-7390bf2e487a3b4c4aee6988d7d2b712-pod | container step-build: &#xA;    [2026-05-02T06:02:08,343082023+00:00] Validate context path&#xA;    [2026-05-02T06:02:08,346510359+00:00] Update CA trust&#xA;    [2026-05-02T06:02:08,347544486+00:00] Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;    &#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;    [2026-05-02T06:02:12,240664532+00:00] Prepare Dockerfile&#xA;    Checking if /var/workdir/cachi2/output/bom.json exists.&#xA;    Could not find prefetched sbom. No content_sets found for ICM&#xA;    [2026-05-02T06:02:12,248230526+00:00] Prepare system (architecture: x86_64)&#xA;    [2026-05-02T06:02:12,264402475+00:00] Setup prefetched&#xA;    Trying to pull registry.access.redhat.com/ubi9/python-39:1-117.1684741281...&#xA;    Getting image source signatures&#xA;    Checking if image destination supports signatures&#xA;    Copying blob sha256:8a2e9815396eaa57b0dfe27b2dfc442417f06aa70974c358f198980b533c7942&#xA;    Copying blob sha256:5465449a2ea5d8a7e05fa498c8ba35f0ce7714b0ad37e716961fca17dfa1ef13&#xA;    Copying blob sha256:085efe85e9dfb0b3d5d2392e4b78660a3091bf1ded336315117a627fbdd0567d&#xA;    Copying blob sha256:a07d808ddf4404b3885fef6100142a973cc667b2c3c4abcf4db96508795b1efb&#xA;    Copying config sha256:45c8f23c11bb64f238236aaf5cbe05595778e1d4fb6c06109c6fcc0a6b57a45b&#xA;    Writing manifest to image destination&#xA;    Storing signatures&#xA;    [2026-05-02T06:02:42,835630513+00:00] Unsetting proxy&#xA;    {&#xA;      &#34;architecture&#34;: &#34;x86_64&#34;,&#xA;      &#34;build-date&#34;: &#34;2026-05-02T06:02:12Z&#34;,&#xA;      &#34;com.redhat.component&#34;: &#34;python-39-container&#34;,&#xA;      &#34;com.redhat.license_terms&#34;: &#34;https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI&#34;,&#xA;      &#34;description&#34;: &#34;Python 3.9 available as container is a base platform for building and running various Python 3.9 applications and frameworks. Python is an easy to learn, powerful programming language. It has efficient high-level data structures and a simple but effective approach to object-oriented programming. Python&#39;s elegant syntax and dynamic typing, together with its interpreted nature, make it an ideal language for scripting and rapid application development in many areas on most platforms.&#34;,&#xA;      &#34;distribution-scope&#34;: &#34;public&#34;,&#xA;      &#34;io.buildah.version&#34;: &#34;1.42.2&#34;,&#xA;      &#34;io.buildpacks.stack.id&#34;: &#34;com.redhat.stacks.ubi9-python-39&#34;,&#xA;      &#34;io.k8s.description&#34;: &#34;Python 3.9 available as container is a base platform for building and running various Python 3.9 applications and frameworks. Python is an easy to learn, powerful programming language. It has efficient high-level data structures and a simple but effective approach to object-oriented programming. Python&#39;s elegant syntax and dynamic typing, together with its interpreted nature, make it an ideal language for scripting and rapid application development in many areas on most platforms.&#34;,&#xA;      &#34;io.k8s.display-name&#34;: &#34;Python 3.9&#34;,&#xA;      &#34;io.openshift.expose-services&#34;: &#34;8080:http&#34;,&#xA;      &#34;io.openshift.s2i.scripts-url&#34;: &#34;image:///usr/libexec/s2i&#34;,&#xA;      &#34;io.openshift.tags&#34;: &#34;builder,python,python39,python-39,rh-python39&#34;,&#xA;      &#34;io.s2i.scripts-url&#34;: &#34;image:///usr/libexec/s2i&#34;,&#xA;      &#34;maintainer&#34;: &#34;SoftwareCollections.org &lt;sclorg@redhat.com&gt;&#34;,&#xA;      &#34;name&#34;: &#34;ubi9/python-39&#34;,&#xA;      &#34;release&#34;: &#34;117.1684741281&#34;,&#xA;      &#34;summary&#34;: &#34;Platform for building and running Python 3.9 applications&#34;,&#xA;      &#34;url&#34;: &#34;https://access.redhat.com/containers/#/registry.access.redhat.com/ubi9/python-39/images/1-117.1684741281&#34;,&#xA;      &#34;usage&#34;: &#34;s2i build https://github.com/sclorg/s2i-python-container.git --context-dir=3.9/test/setup-test-app/ ubi9/python-39 python-sample-app&#34;,&#xA;      &#34;vcs-ref&#34;: &#34;9a58fff0b20b171aa9240228699291a7c9c1b6fd&#34;,&#xA;      &#34;vcs-type&#34;: &#34;git&#34;,&#xA;      &#34;vendor&#34;: &#34;Red Hat, Inc.&#34;,&#xA;      &#34;version&#34;: &#34;1&#34;,&#xA;      &#34;org.opencontainers.image.revision&#34;: &#34;9a58fff0b20b171aa9240228699291a7c9c1b6fd&#34;,&#xA;      &#34;org.opencontainers.image.source&#34;: &#34;https://github.com/redhat-appstudio-qe/sample-multi-component&#34;,&#xA;      &#34;quay.expires-after&#34;: &#34;5d&#34;,&#xA;      &#34;org.opencontainers.image.created&#34;: &#34;2026-05-02T06:02:12Z&#34;&#xA;    }&#xA;    [2026-05-02T06:02:42,939251206+00:00] Register sub-man&#xA;    Adding the entitlement to the build&#xA;    [2026-05-02T06:02:42,942342755+00:00] Add secrets&#xA;    [2026-05-02T06:02:42,958124691+00:00] Run buildah build&#xA;    [2026-05-02T06:02:42,959167684+00:00] buildah build --volume /tmp/entitlement:/etc/pki/entitlement --security-opt=unmask=/proc/interrupts --label architecture=x86_64 --label vcs-type=git --label vcs-ref=9a58fff0b20b171aa9240228699291a7c9c1b6fd --label org.opencontainers.image.revision=9a58fff0b20b171aa9240228699291a7c9c1b6fd --label org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/sample-multi-component --label quay.expires-after=5d --label build-date=2026-05-02T06:02:12Z --label org.opencontainers.image.created=2026-05-02T06:02:12Z --annotation org.opencontainers.image.revision=9a58fff0b20b171aa9240228699291a7c9c1b6fd --annotation org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/sample-multi-component --annotation org.opencontainers.image.created=2026-05-02T06:02:12Z --tls-verify=true --no-cache --ulimit nofile=4096:4096 --http-proxy=false -f /tmp/Dockerfile.xk9LA0 -t quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-9a58fff0b20b171aa9240228699291a7c9c1b6fd . &#xA;    STEP 1/10: FROM registry.access.redhat.com/ubi9/python-39:1-117.1684741281&#xA;    STEP 2/10: EXPOSE 8081/tcp&#xA;    STEP 3/10: ENV FLASK_PORT=8081&#xA;    STEP 4/10: WORKDIR /projects&#xA;    STEP 5/10: COPY . .&#xA;    STEP 6/10: RUN   if [ -f requirements.txt ];     then pip install -r requirements.txt;   elif [ `ls -1q *.txt | wc -l` == 1 ];     then pip install -r *.txt;   fi&#xA;    Collecting Flask==2.3.3&#xA;      Downloading flask-2.3.3-py3-none-any.whl (96 kB)&#xA;    Collecting blinker&gt;=1.6.2&#xA;      Downloading blinker-1.9.0-py3-none-any.whl (8.5 kB)&#xA;    Collecting importlib-metadata&gt;=3.6.0&#xA;      Downloading importlib_metadata-8.7.1-py3-none-any.whl (27 kB)&#xA;    Collecting Jinja2&gt;=3.1.2&#xA;      Downloading jinja2-3.1.6-py3-none-any.whl (134 kB)&#xA;    Collecting itsdangerous&gt;=2.1.2&#xA;      Downloading itsdangerous-2.2.0-py3-none-any.whl (16 kB)&#xA;    Collecting click&gt;=8.1.3&#xA;      Downloading click-8.1.8-py3-none-any.whl (98 kB)&#xA;    Collecting Werkzeug&gt;=2.3.7&#xA;      Downloading werkzeug-3.1.8-py3-none-any.whl (226 kB)&#xA;    Collecting zipp&gt;=3.20&#xA;      Downloading zipp-3.23.1-py3-none-any.whl (10 kB)&#xA;    Collecting MarkupSafe&gt;=2.0&#xA;      Downloading markupsafe-3.0.3-cp39-cp39-manylinux2014_x86_64.manylinux_2_17_x86_64.manylinux_2_28_x86_64.whl (20 kB)&#xA;    Installing collected packages: zipp, MarkupSafe, Werkzeug, Jinja2, itsdangerous, importlib-metadata, click, blinker, Flask&#xA;    Successfully installed Flask-2.3.3 Jinja2-3.1.6 MarkupSafe-3.0.3 Werkzeug-3.1.8 blinker-1.9.0 click-8.1.8 importlib-metadata-8.7.1 itsdangerous-2.2.0 zipp-3.23.1&#xA;    WARNING: You are using pip version 21.3.1; however, version 26.0.1 is available.&#xA;    You should consider upgrading via the &#39;/opt/app-root/bin/python3.9 -m pip install --upgrade pip&#39; command.&#xA;    STEP 7/10: CMD [ &#34;python&#34;, &#34;./app.py&#34; ]&#xA;    STEP 8/10: COPY labels.json /usr/share/buildinfo/labels.json&#xA;    STEP 9/10: COPY labels.json /root/buildinfo/labels.json&#xA;    STEP 10/10: LABEL &#34;architecture&#34;=&#34;x86_64&#34; &#34;vcs-type&#34;=&#34;git&#34; &#34;vcs-ref&#34;=&#34;9a58fff0b20b171aa9240228699291a7c9c1b6fd&#34; &#34;org.opencontainers.image.revision&#34;=&#34;9a58fff0b20b171aa9240228699291a7c9c1b6fd&#34; &#34;org.opencontainers.image.source&#34;=&#34;https://github.com/redhat-appstudio-qe/sample-multi-component&#34; &#34;quay.expires-after&#34;=&#34;5d&#34; &#34;build-date&#34;=&#34;2026-05-02T06:02:12Z&#34; &#34;org.opencontainers.image.created&#34;=&#34;2026-05-02T06:02:12Z&#34;&#xA;    COMMIT quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-9a58fff0b20b171aa9240228699291a7c9c1b6fd&#xA;    --&gt; ca84e75f124f&#xA;    Successfully tagged quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-9a58fff0b20b171aa9240228699291a7c9c1b6fd&#xA;    ca84e75f124f87650d18f671c13714546ff668228556de54b4b53120968860cb&#xA;    [2026-05-02T06:02:48,359474036+00:00] Unsetting proxy&#xA;    [2026-05-02T06:02:48,360843489+00:00] Add metadata&#xA;    Recording base image digests used&#xA;    registry.access.redhat.com/ubi9/python-39:1-117.1684741281 registry.access.redhat.com/ubi9/python-39:1-117.1684741281@sha256:40a58935b9c22664927b22bf256f53a3d744ddb7316f3af18061099e199526ee&#xA;    Getting image source signatures&#xA;    Copying blob sha256:a3551a1f52c5788c9e4e19e7458ecd57b93554fb4cad127b13d61c73c13775e4&#xA;    Copying blob sha256:d661a108c347030c3ef626a0e0020e084fba1e1023193824f5395fa90ef40bde&#xA;    Copying blob sha256:d93d3cc0bc0c5ed9655bcdcf31183ed0b570076c0e6a13e0d7cb907d0b877b00&#xA;    Copying blob sha256:629980bfa23ec05ce5acc61ed2866ddf8713f40bb2a61f0850395082f1457220&#xA;    Copying blob sha256:bc8a0003b3470be53e5cf295daf38c287d3f20ab90e8f5c2b6f17406b158d323&#xA;    Copying config sha256:ca84e75f124f87650d18f671c13714546ff668228556de54b4b53120968860cb&#xA;    Writing manifest to image destination&#xA;    [2026-05-02T06:03:22,157574695+00:00] End build&#xA;    &#xA;    pod: python-component-sukmsc-on-7390bf2e487a3b4c4aee6988d7d2b712-pod | container step-push: &#xA;    [2026-05-02T06:03:22,816503114+00:00] Update CA trust&#xA;    INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;    &#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;    [2026-05-02T06:03:43,886667723+00:00] Convert image&#xA;    [2026-05-02T06:03:43,887746209+00:00] Push image with unique tag&#xA;    Pushing to quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:python-component-sukmsc-on-pull-request-2vxmt-build-container&#xA;    [retry] executing: buildah push --format=docker --retry 3 --tls-verify=true quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-9a58fff0b20b171aa9240228699291a7c9c1b6fd docker://quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:python-component-sukmsc-on-pull-request-2vxmt-build-container&#xA;    Getting image source signatures&#xA;    Copying blob sha256:a3551a1f52c5788c9e4e19e7458ecd57b93554fb4cad127b13d61c73c13775e4&#xA;    Copying blob sha256:bc8a0003b3470be53e5cf295daf38c287d3f20ab90e8f5c2b6f17406b158d323&#xA;    Copying blob sha256:d93d3cc0bc0c5ed9655bcdcf31183ed0b570076c0e6a13e0d7cb907d0b877b00&#xA;    Copying blob sha256:629980bfa23ec05ce5acc61ed2866ddf8713f40bb2a61f0850395082f1457220&#xA;    Copying blob sha256:d661a108c347030c3ef626a0e0020e084fba1e1023193824f5395fa90ef40bde&#xA;    &#xA;    pod: python-component-sukmsc-on-7390bf2e487a3b4c4aee6988d7d2b712-pod | container step-sbom-syft-generate: &#xA;    &#xA;    pod: python-component-sukmsc-on-7390bf2e487a3b4c4aee6988d7d2b712-pod | container step-prepare-sboms: &#xA;    &#xA;    pod: python-component-sukmsc-on-7390bf2e487a3b4c4aee6988d7d2b712-pod | container step-upload-sbom: &#xA;    &#xA;     pod: python-component-sukmsc-on-pull-request-2vxmt-init-pod | init container: prepare&#xA;    2026/05/02 06:01:09 Entrypoint initialization&#xA;    &#xA;    pod: python-component-sukmsc-on-pull-request-2vxmt-init-pod | container step-init: &#xA;    time=&#34;2026-05-02T06:01:13Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;    time=&#34;2026-05-02T06:01:13Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;    time=&#34;2026-05-02T06:01:13Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;    time=&#34;2026-05-02T06:01:13Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;    time=&#34;2026-05-02T06:01:13Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;    time=&#34;2026-05-02T06:01:13Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;    time=&#34;2026-05-02T06:01:13Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;    time=&#34;2026-05-02T06:01:13Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;    time=&#34;2026-05-02T06:01:13Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;    &#xA;    {&#xA;        s: &#34;\n pod: python-component-sukmsc-on-591f02614276501c9909e28298413f3d-pod | init container: prepare\n2026/05/02 06:01:15 Entrypoint initialization\n\n pod: python-component-sukmsc-on-591f02614276501c9909e28298413f3d-pod | init container: place-scripts\n2026/05/02 06:01:15 Decoded script /tekton/scripts/script-0-42c8p\n2026/05/02 06:01:15 Decoded script /tekton/scripts/script-1-clsx6\n\npod: python-component-sukmsc-on-591f02614276501c9909e28298413f3d-pod | container step-clone: \nINFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt\n{\&#34;level\&#34;:\&#34;info\&#34;,\&#34;ts\&#34;:1777701678.9782343,\&#34;caller\&#34;:\&#34;git/git.go:394\&#34;,\&#34;msg\&#34;:\&#34;Retrying operation (attempt 1)\&#34;}\n{\&#34;level\&#34;:\&#34;info\&#34;,\&#34;ts\&#34;:1777701679.423236,\&#34;caller\&#34;:\&#34;git/git.go:223\&#34;,\&#34;msg\&#34;:\&#34;Successfully cloned https://github.com/redhat-appstudio-qe/sample-multi-component @ 9a58fff0b20b171aa9240228699291a7c9c1b6fd (grafted, HEAD) in path /var/workdir/source\&#34;}\n{\&#34;level\&#34;:\&#34;info\&#34;,\&#34;ts\&#34;:1777701679.4232862,\&#34;caller\&#34;:\&#34;git/git.go:394\&#34;,\&#34;msg\&#34;:\&#34;Retrying operation (attempt 1)\&#34;}\n{\&#34;level\&#34;:\&#34;info\&#34;,\&#34;ts\&#34;:1777701679.4468265,\&#34;caller\&#34;:\&#34;git/git.go:277\&#34;,\&#34;msg\&#34;:\&#34;Successfully initialized and updated submodules in path /var/workdir/source\&#34;}\nMerge option disabled. Using checked-out revision 9a58fff0b20b171aa9240228699291a7c9c1b6fd directly.\n\npod: python-component-sukmsc-on-591f02614276501c9909e28298413f3d-pod | container step-symlink-check: \nRunning symlink check\n\npod: python-component-sukmsc-on-591f02614276501c9909e28298413f3d-pod | container step-create-trusted-artifact: \nPrepared artifact from /var/workdir/source (sha256:30a0bd277a19ad7be874275280017ea11cf53bbb756ca66fd1cdcd2fa0c312c1)\nUsing token for quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc\nExecuting: oras push --annotation=quay.expires-after=5d --registry-config /tmp/create-oci.sh.J0N6ty/auth-CgZpio.json quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-9a58fff0b20b171aa9240228699291a7c9c1b6fd.git SOURCE_ARTIFACT\nUploading 30a0bd277a19 SOURCE_ARTIFACT\nUploaded  30a0bd277a19 SOURCE_ARTIFACT\nPushed [registry] quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-9a58fff0b20b171aa9240228699291a7c9c1b6fd.git\nArtifactType: application/vnd.unknown.artifact.v1\nDigest: sha256:29b0286379e2717b11864360450387a73e9986f6be7c3627aab5854f910f9a93\nArtifacts created\n\n\n pod: python-component-sukmsc-on-7390bf2e487a3b4c4aee6988d7d2b712-pod | init container: prepare\n2026/05/02 06:02:02 Entrypoint initialization\n\n pod: python-component-sukmsc-on-7390bf2e487a3b4c4aee6988d7d2b712-pod | init container: place-scripts\n2026/05/02 06:02:03 Decoded script /tekton/scripts/script-1-wknqh\n2026/05/02 06:02:03 Decoded script /tekton/scripts/script-2-rhf2s\n2026/05/02 06:02:03 Decoded script /tekton/scripts/script-3-xkm58\n2026/05/02 06:02:03 Decoded script /tekton/scripts/script-4-hkg9r\n2026/05/02 06:02:03 Decoded script /tekton/scripts/script-5-n82hr\n\npod: python-component-sukmsc-on-7390bf2e487a3b4c4aee6988d7d2b712-pod | container step-use-trusted-artifact: \nUsing token for quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc\nExecuting: oras blob fetch --registry-config /tmp/use-oci.sh.OztHxz/auth-Sp4x4T.json quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc@sha256:30a0bd277a19ad7be874275280017ea11cf53bbb756ca66fd1cdcd2fa0c312c1 --output -\nRestored artifact quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc@sha256:30a0bd277a19ad7be874275280017ea11cf53bbb756ca66fd1cdcd2fa0c312c1 to /var/workdir/source\nWARN: artifact URI not provided, (given: =/var/workdir/cachi2)\n\n\npod: python-component-sukmsc-on-7390bf2e487a3b4c4aee6988d7d2b712-pod | container step-build: \n[2026-05-02T06:02:08,343082023+00:00] Validate context path\n[2026-05-02T06:02:08,346510359+00:00] Update CA trust\n[2026-05-02T06:02:08,347544486+00:00] Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt\n&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; ...&#xA;&#xA;Gomega truncated this representation as it exceeds &#39;format.MaxLength&#39;.&#xA;Consider having the object provide a custom &#39;GomegaStringer&#39; representation&#xA;or adjust the parameters in Gomega&#39;s &#39;format&#39; package.&#xA;&#xA;Learn more here: https://onsi.github.io/gomega/#adjusting-output&#xA;In [It] at: /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:161 @ 05/02/26 06:06:08.218&#xA;</failure>
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully for component python-component-sukmsc - /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:159 @ 05/02/26 05:42:42.096&#xA;PipelineRun python-component-sukmsc-on-pull-request-zg9vq found for Component build-e2e-wqrk/python-component-sukmsc&#xA;PipelineRun python-component-sukmsc-on-pull-request-zg9vq reason: ResolvingTaskRef&#xA;PipelineRun python-component-sukmsc-on-pull-request-zg9vq reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-zg9vq reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-zg9vq reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-zg9vq reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-zg9vq reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-zg9vq reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-zg9vq reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-zg9vq reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-zg9vq reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-zg9vq reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-zg9vq reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-zg9vq reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-zg9vq reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-zg9vq reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-zg9vq reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-zg9vq reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-zg9vq reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-zg9vq reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-zg9vq reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-zg9vq reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-zg9vq reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-zg9vq reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-zg9vq reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-zg9vq reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-zg9vq reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-zg9vq reason: Failed&#xA;attempt 1/3: PipelineRun &#34;python-component-sukmsc-on-pull-request-zg9vq&#34; failed: &#xA; pod: python-component-sukmsc-on-3d3172b85ea5e0c15d02ec1309ff8970-pod | init container: prepare&#xA;2026/05/02 05:45:47 Entrypoint initialization&#xA;&#xA; pod: python-component-sukmsc-on-3d3172b85ea5e0c15d02ec1309ff8970-pod | init container: place-scripts&#xA;2026/05/02 05:45:48 Decoded script /tekton/scripts/script-1-hl8vj&#xA;2026/05/02 05:45:48 Decoded script /tekton/scripts/script-2-nv22m&#xA;2026/05/02 05:45:48 Decoded script /tekton/scripts/script-3-9jmt9&#xA;2026/05/02 05:45:48 Decoded script /tekton/scripts/script-4-cr4nj&#xA;2026/05/02 05:45:48 Decoded script /tekton/scripts/script-5-dtzrv&#xA;&#xA;pod: python-component-sukmsc-on-3d3172b85ea5e0c15d02ec1309ff8970-pod | container step-use-trusted-artifact: &#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc&#xA;Executing: oras blob fetch --registry-config /tmp/use-oci.sh.7uWG5d/auth-x4nJQS.json quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc@sha256:06cff40a3970c64bcccdbbfc59f27155ab36c51c6529191b8df58d96cdb58728 --output -&#xA;Restored artifact quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc@sha256:06cff40a3970c64bcccdbbfc59f27155ab36c51c6529191b8df58d96cdb58728 to /var/workdir/source&#xA;WARN: artifact URI not provided, (given: =/var/workdir/cachi2)&#xA;&#xA;&#xA;pod: python-component-sukmsc-on-3d3172b85ea5e0c15d02ec1309ff8970-pod | container step-build: &#xA;[2026-05-02T05:45:54,435434352+00:00] Validate context path&#xA;[2026-05-02T05:45:54,439017475+00:00] Update CA trust&#xA;[2026-05-02T05:45:54,440009173+00:00] Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;[2026-05-02T05:45:58,308082555+00:00] Prepare Dockerfile&#xA;Checking if /var/workdir/cachi2/output/bom.json exists.&#xA;Could not find prefetched sbom. No content_sets found for ICM&#xA;[2026-05-02T05:45:58,315787432+00:00] Prepare system (architecture: x86_64)&#xA;[2026-05-02T05:45:58,332116835+00:00] Setup prefetched&#xA;Trying to pull registry.access.redhat.com/ubi9/python-39:1-117.1684741281...&#xA;Getting image source signatures&#xA;Checking if image destination supports signatures&#xA;Copying blob sha256:8a2e9815396eaa57b0dfe27b2dfc442417f06aa70974c358f198980b533c7942&#xA;Copying blob sha256:5465449a2ea5d8a7e05fa498c8ba35f0ce7714b0ad37e716961fca17dfa1ef13&#xA;Copying blob sha256:085efe85e9dfb0b3d5d2392e4b78660a3091bf1ded336315117a627fbdd0567d&#xA;Copying blob sha256:a07d808ddf4404b3885fef6100142a973cc667b2c3c4abcf4db96508795b1efb&#xA;Copying config sha256:45c8f23c11bb64f238236aaf5cbe05595778e1d4fb6c06109c6fcc0a6b57a45b&#xA;Writing manifest to image destination&#xA;Storing signatures&#xA;[2026-05-02T05:46:49,136550699+00:00] Unsetting proxy&#xA;{&#xA;  &#34;architecture&#34;: &#34;x86_64&#34;,&#xA;  &#34;build-date&#34;: &#34;2026-05-02T05:45:58Z&#34;,&#xA;  &#34;com.redhat.component&#34;: &#34;python-39-container&#34;,&#xA;  &#34;com.redhat.license_terms&#34;: &#34;https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI&#34;,&#xA;  &#34;description&#34;: &#34;Python 3.9 available as container is a base platform for building and running various Python 3.9 applications and frameworks. Python is an easy to learn, powerful programming language. It has efficient high-level data structures and a simple but effective approach to object-oriented programming. Python&#39;s elegant syntax and dynamic typing, together with its interpreted nature, make it an ideal language for scripting and rapid application development in many areas on most platforms.&#34;,&#xA;  &#34;distribution-scope&#34;: &#34;public&#34;,&#xA;  &#34;io.buildah.version&#34;: &#34;1.42.2&#34;,&#xA;  &#34;io.buildpacks.stack.id&#34;: &#34;com.redhat.stacks.ubi9-python-39&#34;,&#xA;  &#34;io.k8s.description&#34;: &#34;Python 3.9 available as container is a base platform for building and running various Python 3.9 applications and frameworks. Python is an easy to learn, powerful programming language. It has efficient high-level data structures and a simple but effective approach to object-oriented programming. Python&#39;s elegant syntax and dynamic typing, together with its interpreted nature, make it an ideal language for scripting and rapid application development in many areas on most platforms.&#34;,&#xA;  &#34;io.k8s.display-name&#34;: &#34;Python 3.9&#34;,&#xA;  &#34;io.openshift.expose-services&#34;: &#34;8080:http&#34;,&#xA;  &#34;io.openshift.s2i.scripts-url&#34;: &#34;image:///usr/libexec/s2i&#34;,&#xA;  &#34;io.openshift.tags&#34;: &#34;builder,python,python39,python-39,rh-python39&#34;,&#xA;  &#34;io.s2i.scripts-url&#34;: &#34;image:///usr/libexec/s2i&#34;,&#xA;  &#34;maintainer&#34;: &#34;SoftwareCollections.org &lt;sclorg@redhat.com&gt;&#34;,&#xA;  &#34;name&#34;: &#34;ubi9/python-39&#34;,&#xA;  &#34;release&#34;: &#34;117.1684741281&#34;,&#xA;  &#34;summary&#34;: &#34;Platform for building and running Python 3.9 applications&#34;,&#xA;  &#34;url&#34;: &#34;https://access.redhat.com/containers/#/registry.access.redhat.com/ubi9/python-39/images/1-117.1684741281&#34;,&#xA;  &#34;usage&#34;: &#34;s2i build https://github.com/sclorg/s2i-python-container.git --context-dir=3.9/test/setup-test-app/ ubi9/python-39 python-sample-app&#34;,&#xA;  &#34;vcs-ref&#34;: &#34;5e9d7456147050972e8bd012a2304f2853af7090&#34;,&#xA;  &#34;vcs-type&#34;: &#34;git&#34;,&#xA;  &#34;vendor&#34;: &#34;Red Hat, Inc.&#34;,&#xA;  &#34;version&#34;: &#34;1&#34;,&#xA;  &#34;org.opencontainers.image.revision&#34;: &#34;5e9d7456147050972e8bd012a2304f2853af7090&#34;,&#xA;  &#34;org.opencontainers.image.source&#34;: &#34;https://github.com/redhat-appstudio-qe/sample-multi-component&#34;,&#xA;  &#34;quay.expires-after&#34;: &#34;5d&#34;,&#xA;  &#34;org.opencontainers.image.created&#34;: &#34;2026-05-02T05:45:58Z&#34;&#xA;}&#xA;[2026-05-02T05:46:49,205137997+00:00] Register sub-man&#xA;Adding the entitlement to the build&#xA;[2026-05-02T05:46:49,208439364+00:00] Add secrets&#xA;[2026-05-02T05:46:49,223410703+00:00] Run buildah build&#xA;[2026-05-02T05:46:49,224508110+00:00] buildah build --volume /tmp/entitlement:/etc/pki/entitlement --security-opt=unmask=/proc/interrupts --label architecture=x86_64 --label vcs-type=git --label vcs-ref=5e9d7456147050972e8bd012a2304f2853af7090 --label org.opencontainers.image.revision=5e9d7456147050972e8bd012a2304f2853af7090 --label org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/sample-multi-component --label quay.expires-after=5d --label build-date=2026-05-02T05:45:58Z --label org.opencontainers.image.created=2026-05-02T05:45:58Z --annotation org.opencontainers.image.revision=5e9d7456147050972e8bd012a2304f2853af7090 --annotation org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/sample-multi-component --annotation org.opencontainers.image.created=2026-05-02T05:45:58Z --tls-verify=true --no-cache --ulimit nofile=4096:4096 --http-proxy=false -f /tmp/Dockerfile.E1ZDdx -t quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-5e9d7456147050972e8bd012a2304f2853af7090 . &#xA;STEP 1/10: FROM registry.access.redhat.com/ubi9/python-39:1-117.1684741281&#xA;STEP 2/10: EXPOSE 8081/tcp&#xA;STEP 3/10: ENV FLASK_PORT=8081&#xA;STEP 4/10: WORKDIR /projects&#xA;STEP 5/10: COPY . .&#xA;STEP 6/10: RUN   if [ -f requirements.txt ];     then pip install -r requirements.txt;   elif [ `ls -1q *.txt | wc -l` == 1 ];     then pip install -r *.txt;   fi&#xA;Collecting Flask==2.3.3&#xA;  Downloading flask-2.3.3-py3-none-any.whl (96 kB)&#xA;Collecting Werkzeug&gt;=2.3.7&#xA;  Downloading werkzeug-3.1.8-py3-none-any.whl (226 kB)&#xA;Collecting Jinja2&gt;=3.1.2&#xA;  Downloading jinja2-3.1.6-py3-none-any.whl (134 kB)&#xA;Collecting importlib-metadata&gt;=3.6.0&#xA;  Downloading importlib_metadata-8.7.1-py3-none-any.whl (27 kB)&#xA;Collecting itsdangerous&gt;=2.1.2&#xA;  Downloading itsdangerous-2.2.0-py3-none-any.whl (16 kB)&#xA;Collecting click&gt;=8.1.3&#xA;  Downloading click-8.1.8-py3-none-any.whl (98 kB)&#xA;Collecting blinker&gt;=1.6.2&#xA;  Downloading blinker-1.9.0-py3-none-any.whl (8.5 kB)&#xA;Collecting zipp&gt;=3.20&#xA;  Downloading zipp-3.23.1-py3-none-any.whl (10 kB)&#xA;Collecting MarkupSafe&gt;=2.0&#xA;  Downloading markupsafe-3.0.3-cp39-cp39-manylinux2014_x86_64.manylinux_2_17_x86_64.manylinux_2_28_x86_64.whl (20 kB)&#xA;Installing collected packages: zipp, MarkupSafe, Werkzeug, Jinja2, itsdangerous, importlib-metadata, click, blinker, Flask&#xA;Successfully installed Flask-2.3.3 Jinja2-3.1.6 MarkupSafe-3.0.3 Werkzeug-3.1.8 blinker-1.9.0 click-8.1.8 importlib-metadata-8.7.1 itsdangerous-2.2.0 zipp-3.23.1&#xA;WARNING: You are using pip version 21.3.1; however, version 26.0.1 is available.&#xA;You should consider upgrading via the &#39;/opt/app-root/bin/python3.9 -m pip install --upgrade pip&#39; command.&#xA;STEP 7/10: CMD [ &#34;python&#34;, &#34;./app.py&#34; ]&#xA;STEP 8/10: COPY labels.json /usr/share/buildinfo/labels.json&#xA;STEP 9/10: COPY labels.json /root/buildinfo/labels.json&#xA;STEP 10/10: LABEL &#34;architecture&#34;=&#34;x86_64&#34; &#34;vcs-type&#34;=&#34;git&#34; &#34;vcs-ref&#34;=&#34;5e9d7456147050972e8bd012a2304f2853af7090&#34; &#34;org.opencontainers.image.revision&#34;=&#34;5e9d7456147050972e8bd012a2304f2853af7090&#34; &#34;org.opencontainers.image.source&#34;=&#34;https://github.com/redhat-appstudio-qe/sample-multi-component&#34; &#34;quay.expires-after&#34;=&#34;5d&#34; &#34;build-date&#34;=&#34;2026-05-02T05:45:58Z&#34; &#34;org.opencontainers.image.created&#34;=&#34;2026-05-02T05:45:58Z&#34;&#xA;COMMIT quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-5e9d7456147050972e8bd012a2304f2853af7090&#xA;--&gt; 880be21bb0a4&#xA;Successfully tagged quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-5e9d7456147050972e8bd012a2304f2853af7090&#xA;880be21bb0a4dc887183f659aa71c959e4ec28102a3ef2c74b39e7e6a44dec3e&#xA;[2026-05-02T05:46:55,183562848+00:00] Unsetting proxy&#xA;[2026-05-02T05:46:55,184914592+00:00] Add metadata&#xA;Recording base image digests used&#xA;registry.access.redhat.com/ubi9/python-39:1-117.1684741281 registry.access.redhat.com/ubi9/python-39:1-117.1684741281@sha256:40a58935b9c22664927b22bf256f53a3d744ddb7316f3af18061099e199526ee&#xA;Getting image source signatures&#xA;Copying blob sha256:6c1759502abb16f05c80d58967d8fb390a61614ead8273dc0332b032414656aa&#xA;Copying blob sha256:bc8a0003b3470be53e5cf295daf38c287d3f20ab90e8f5c2b6f17406b158d323&#xA;Copying blob sha256:d93d3cc0bc0c5ed9655bcdcf31183ed0b570076c0e6a13e0d7cb907d0b877b00&#xA;Copying blob sha256:d661a108c347030c3ef626a0e0020e084fba1e1023193824f5395fa90ef40bde&#xA;Copying blob sha256:629980bfa23ec05ce5acc61ed2866ddf8713f40bb2a61f0850395082f1457220&#xA;Copying config sha256:880be21bb0a4dc887183f659aa71c959e4ec28102a3ef2c74b39e7e6a44dec3e&#xA;Writing manifest to image destination&#xA;[2026-05-02T05:47:40,567015487+00:00] End build&#xA;&#xA;pod: python-component-sukmsc-on-3d3172b85ea5e0c15d02ec1309ff8970-pod | container step-push: &#xA;[2026-05-02T05:47:40,874407321+00:00] Update CA trust&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;[2026-05-02T05:48:03,619431673+00:00] Convert image&#xA;[2026-05-02T05:48:03,620452583+00:00] Push image with unique tag&#xA;Pushing to quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:python-component-sukmsc-on-pull-request-zg9vq-build-container&#xA;[retry] executing: buildah push --format=docker --retry 3 --tls-verify=true quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-5e9d7456147050972e8bd012a2304f2853af7090 docker://quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:python-component-sukmsc-on-pull-request-zg9vq-build-container&#xA;Getting image source signatures&#xA;Copying blob sha256:6c1759502abb16f05c80d58967d8fb390a61614ead8273dc0332b032414656aa&#xA;Copying blob sha256:bc8a0003b3470be53e5cf295daf38c287d3f20ab90e8f5c2b6f17406b158d323&#xA;Copying blob sha256:d93d3cc0bc0c5ed9655bcdcf31183ed0b570076c0e6a13e0d7cb907d0b877b00&#xA;Copying blob sha256:d661a108c347030c3ef626a0e0020e084fba1e1023193824f5395fa90ef40bde&#xA;Copying blob sha256:629980bfa23ec05ce5acc61ed2866ddf8713f40bb2a61f0850395082f1457220&#xA;&#xA;pod: python-component-sukmsc-on-3d3172b85ea5e0c15d02ec1309ff8970-pod | container step-sbom-syft-generate: &#xA;&#xA;pod: python-component-sukmsc-on-3d3172b85ea5e0c15d02ec1309ff8970-pod | container step-prepare-sboms: &#xA;&#xA;pod: python-component-sukmsc-on-3d3172b85ea5e0c15d02ec1309ff8970-pod | container step-upload-sbom: &#xA;&#xA; pod: python-component-sukmsc-on-754999f46a0fa17555be458a5cf6e66a-pod | init container: prepare&#xA;2026/05/02 05:44:21 Entrypoint initialization&#xA;&#xA; pod: python-component-sukmsc-on-754999f46a0fa17555be458a5cf6e66a-pod | init container: place-scripts&#xA;2026/05/02 05:44:28 Decoded script /tekton/scripts/script-0-ch9rn&#xA;2026/05/02 05:44:28 Decoded script /tekton/scripts/script-1-d5ndj&#xA;&#xA;pod: python-component-sukmsc-on-754999f46a0fa17555be458a5cf6e66a-pod | container step-clone: &#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1777700694.173177,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1777700694.6118438,&#34;caller&#34;:&#34;git/git.go:223&#34;,&#34;msg&#34;:&#34;Successfully cloned https://github.com/redhat-appstudio-qe/sample-multi-component @ 5e9d7456147050972e8bd012a2304f2853af7090 (grafted, HEAD) in path /var/workdir/source&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1777700694.6118908,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1777700694.6385515,&#34;caller&#34;:&#34;git/git.go:277&#34;,&#34;msg&#34;:&#34;Successfully initialized and updated submodules in path /var/workdir/source&#34;}&#xA;Merge option disabled. Using checked-out revision 5e9d7456147050972e8bd012a2304f2853af7090 directly.&#xA;&#xA;pod: python-component-sukmsc-on-754999f46a0fa17555be458a5cf6e66a-pod | container step-symlink-check: &#xA;Running symlink check&#xA;&#xA;pod: python-component-sukmsc-on-754999f46a0fa17555be458a5cf6e66a-pod | container step-create-trusted-artifact: &#xA;Prepared artifact from /var/workdir/source (sha256:06cff40a3970c64bcccdbbfc59f27155ab36c51c6529191b8df58d96cdb58728)&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc&#xA;Executing: oras push --annotation=quay.expires-after=5d --registry-config /tmp/create-oci.sh.LSOynh/auth-yT5i5V.json quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-5e9d7456147050972e8bd012a2304f2853af7090.git SOURCE_ARTIFACT&#xA;Uploading 06cff40a3970 SOURCE_ARTIFACT&#xA;Uploaded  06cff40a3970 SOURCE_ARTIFACT&#xA;Pushed [registry] quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-5e9d7456147050972e8bd012a2304f2853af7090.git&#xA;ArtifactType: application/vnd.unknown.artifact.v1&#xA;Digest: sha256:fee9b79c54daebaa5a22532de75a5a97729d55ba732bf70c20b1afdbdca0ee79&#xA;Artifacts created&#xA;&#xA;&#xA; pod: python-component-sukmsc-on-pull-request-zg9vq-init-pod | init container: prepare&#xA;2026/05/02 05:43:37 Entrypoint initialization&#xA;&#xA;pod: python-component-sukmsc-on-pull-request-zg9vq-init-pod | container step-init: &#xA;time=&#34;2026-05-02T05:44:02Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-05-02T05:44:02Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-05-02T05:44:02Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-05-02T05:44:02Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-05-02T05:44:02Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-05-02T05:44:02Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-02T05:44:02Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-05-02T05:44:02Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-05-02T05:44:02Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;New PipelineRun python-component-sukmsc-on-pull-request-g52js found after retrigger for component build-e2e-wqrk/python-component-sukmsc&#xA;PipelineRun python-component-sukmsc-on-pull-request-g52js found for Component build-e2e-wqrk/python-component-sukmsc&#xA;PipelineRun python-component-sukmsc-on-pull-request-g52js reason: ResolvingTaskRef&#xA;PipelineRun python-component-sukmsc-on-pull-request-g52js reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-g52js reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-g52js reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-g52js reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-g52js reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-g52js reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-g52js reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-g52js reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-g52js reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-g52js reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-g52js reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-g52js reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-g52js reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-g52js reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-g52js reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-g52js reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-g52js reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-g52js reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-g52js reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-g52js reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-g52js reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-g52js reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-g52js reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-g52js reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-g52js reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-g52js reason: PipelineRunStopping&#xA;PipelineRun python-component-sukmsc-on-pull-request-g52js reason: Failed&#xA;attempt 2/3: PipelineRun &#34;python-component-sukmsc-on-pull-request-g52js&#34; failed: &#xA; pod: python-component-sukmsc-on-4d00d73d9f32a7889b3519c6da3e8f90-pod | init container: prepare&#xA;2026/05/02 05:52:38 Entrypoint initialization&#xA;&#xA; pod: python-component-sukmsc-on-4d00d73d9f32a7889b3519c6da3e8f90-pod | init container: place-scripts&#xA;2026/05/02 05:52:39 Decoded script /tekton/scripts/script-1-jqn5n&#xA;2026/05/02 05:52:39 Decoded script /tekton/scripts/script-2-v2r5f&#xA;2026/05/02 05:52:39 Decoded script /tekton/scripts/script-3-q2wqz&#xA;2026/05/02 05:52:39 Decoded script /tekton/scripts/script-4-5jmn7&#xA;2026/05/02 05:52:39 Decoded script /tekton/scripts/script-5-v262p&#xA;&#xA;pod: python-component-sukmsc-on-4d00d73d9f32a7889b3519c6da3e8f90-pod | container step-use-trusted-artifact: &#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc&#xA;Executing: oras blob fetch --registry-config /tmp/use-oci.sh.lF2h7i/auth-ucX3Mf.json quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc@sha256:1be8c6571584be9aeebd552893a68dbc5fc5bf91179437d45cfc9f406a8e597b --output -&#xA;Restored artifact quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc@sha256:1be8c6571584be9aeebd552893a68dbc5fc5bf91179437d45cfc9f406a8e597b to /var/workdir/source&#xA;WARN: artifact URI not provided, (given: =/var/workdir/cachi2)&#xA;&#xA;&#xA;pod: python-component-sukmsc-on-4d00d73d9f32a7889b3519c6da3e8f90-pod | container step-build: &#xA;[2026-05-02T05:52:45,310161517+00:00] Validate context path&#xA;[2026-05-02T05:52:45,313603358+00:00] Update CA trust&#xA;[2026-05-02T05:52:45,314606115+00:00] Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;[2026-05-02T05:52:49,698074396+00:00] Prepare Dockerfile&#xA;Checking if /var/workdir/cachi2/output/bom.json exists.&#xA;Could not find prefetched sbom. No content_sets found for ICM&#xA;[2026-05-02T05:52:49,757246497+00:00] Prepare system (architecture: x86_64)&#xA;[2026-05-02T05:52:49,773512560+00:00] Setup prefetched&#xA;Trying to pull registry.access.redhat.com/ubi9/python-39:1-117.1684741281...&#xA;Getting image source signatures&#xA;Checking if image destination supports signatures&#xA;Copying blob sha256:8a2e9815396eaa57b0dfe27b2dfc442417f06aa70974c358f198980b533c7942&#xA;Copying blob sha256:5465449a2ea5d8a7e05fa498c8ba35f0ce7714b0ad37e716961fca17dfa1ef13&#xA;Copying blob sha256:085efe85e9dfb0b3d5d2392e4b78660a3091bf1ded336315117a627fbdd0567d&#xA;Copying blob sha256:a07d808ddf4404b3885fef6100142a973cc667b2c3c4abcf4db96508795b1efb&#xA;Copying config sha256:45c8f23c11bb64f238236aaf5cbe05595778e1d4fb6c06109c6fcc0a6b57a45b&#xA;Writing manifest to image destination&#xA;Storing signatures&#xA;[2026-05-02T05:53:20,865452106+00:00] Unsetting proxy&#xA;{&#xA;  &#34;architecture&#34;: &#34;x86_64&#34;,&#xA;  &#34;build-date&#34;: &#34;2026-05-02T05:52:49Z&#34;,&#xA;  &#34;com.redhat.component&#34;: &#34;python-39-container&#34;,&#xA;  &#34;com.redhat.license_terms&#34;: &#34;https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI&#34;,&#xA;  &#34;description&#34;: &#34;Python 3.9 available as container is a base platform for building and running various Python 3.9 applications and frameworks. Python is an easy to learn, powerful programming language. It has efficient high-level data structures and a simple but effective approach to object-oriented programming. Python&#39;s elegant syntax and dynamic typing, together with its interpreted nature, make it an ideal language for scripting and rapid application development in many areas on most platforms.&#34;,&#xA;  &#34;distribution-scope&#34;: &#34;public&#34;,&#xA;  &#34;io.buildah.version&#34;: &#34;1.42.2&#34;,&#xA;  &#34;io.buildpacks.stack.id&#34;: &#34;com.redhat.stacks.ubi9-python-39&#34;,&#xA;  &#34;io.k8s.description&#34;: &#34;Python 3.9 available as container is a base platform for building and running various Python 3.9 applications and frameworks. Python is an easy to learn, powerful programming language. It has efficient high-level data structures and a simple but effective approach to object-oriented programming. Python&#39;s elegant syntax and dynamic typing, together with its interpreted nature, make it an ideal language for scripting and rapid application development in many areas on most platforms.&#34;,&#xA;  &#34;io.k8s.display-name&#34;: &#34;Python 3.9&#34;,&#xA;  &#34;io.openshift.expose-services&#34;: &#34;8080:http&#34;,&#xA;  &#34;io.openshift.s2i.scripts-url&#34;: &#34;image:///usr/libexec/s2i&#34;,&#xA;  &#34;io.openshift.tags&#34;: &#34;builder,python,python39,python-39,rh-python39&#34;,&#xA;  &#34;io.s2i.scripts-url&#34;: &#34;image:///usr/libexec/s2i&#34;,&#xA;  &#34;maintainer&#34;: &#34;SoftwareCollections.org &lt;sclorg@redhat.com&gt;&#34;,&#xA;  &#34;name&#34;: &#34;ubi9/python-39&#34;,&#xA;  &#34;release&#34;: &#34;117.1684741281&#34;,&#xA;  &#34;summary&#34;: &#34;Platform for building and running Python 3.9 applications&#34;,&#xA;  &#34;url&#34;: &#34;https://access.redhat.com/containers/#/registry.access.redhat.com/ubi9/python-39/images/1-117.1684741281&#34;,&#xA;  &#34;usage&#34;: &#34;s2i build https://github.com/sclorg/s2i-python-container.git --context-dir=3.9/test/setup-test-app/ ubi9/python-39 python-sample-app&#34;,&#xA;  &#34;vcs-ref&#34;: &#34;8db91b08c42f4543dde16ba8ac772c5a35f83632&#34;,&#xA;  &#34;vcs-type&#34;: &#34;git&#34;,&#xA;  &#34;vendor&#34;: &#34;Red Hat, Inc.&#34;,&#xA;  &#34;version&#34;: &#34;1&#34;,&#xA;  &#34;org.opencontainers.image.revision&#34;: &#34;8db91b08c42f4543dde16ba8ac772c5a35f83632&#34;,&#xA;  &#34;org.opencontainers.image.source&#34;: &#34;https://github.com/redhat-appstudio-qe/sample-multi-component&#34;,&#xA;  &#34;quay.expires-after&#34;: &#34;5d&#34;,&#xA;  &#34;org.opencontainers.image.created&#34;: &#34;2026-05-02T05:52:49Z&#34;&#xA;}&#xA;[2026-05-02T05:53:20,967803990+00:00] Register sub-man&#xA;Adding the entitlement to the build&#xA;[2026-05-02T05:53:20,970866796+00:00] Add secrets&#xA;[2026-05-02T05:53:20,986355232+00:00] Run buildah build&#xA;[2026-05-02T05:53:20,987614197+00:00] buildah build --volume /tmp/entitlement:/etc/pki/entitlement --security-opt=unmask=/proc/interrupts --label architecture=x86_64 --label vcs-type=git --label vcs-ref=8db91b08c42f4543dde16ba8ac772c5a35f83632 --label org.opencontainers.image.revision=8db91b08c42f4543dde16ba8ac772c5a35f83632 --label org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/sample-multi-component --label quay.expires-after=5d --label build-date=2026-05-02T05:52:49Z --label org.opencontainers.image.created=2026-05-02T05:52:49Z --annotation org.opencontainers.image.revision=8db91b08c42f4543dde16ba8ac772c5a35f83632 --annotation org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/sample-multi-component --annotation org.opencontainers.image.created=2026-05-02T05:52:49Z --tls-verify=true --no-cache --ulimit nofile=4096:4096 --http-proxy=false -f /tmp/Dockerfile.erUxuw -t quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-8db91b08c42f4543dde16ba8ac772c5a35f83632 . &#xA;STEP 1/10: FROM registry.access.redhat.com/ubi9/python-39:1-117.1684741281&#xA;STEP 2/10: EXPOSE 8081/tcp&#xA;STEP 3/10: ENV FLASK_PORT=8081&#xA;STEP 4/10: WORKDIR /projects&#xA;STEP 5/10: COPY . .&#xA;STEP 6/10: RUN   if [ -f requirements.txt ];     then pip install -r requirements.txt;   elif [ `ls -1q *.txt | wc -l` == 1 ];     then pip install -r *.txt;   fi&#xA;Collecting Flask==2.3.3&#xA;  Downloading flask-2.3.3-py3-none-any.whl (96 kB)&#xA;Collecting itsdangerous&gt;=2.1.2&#xA;  Downloading itsdangerous-2.2.0-py3-none-any.whl (16 kB)&#xA;Collecting Werkzeug&gt;=2.3.7&#xA;  Downloading werkzeug-3.1.8-py3-none-any.whl (226 kB)&#xA;Collecting blinker&gt;=1.6.2&#xA;  Downloading blinker-1.9.0-py3-none-any.whl (8.5 kB)&#xA;Collecting importlib-metadata&gt;=3.6.0&#xA;  Downloading importlib_metadata-8.7.1-py3-none-any.whl (27 kB)&#xA;Collecting click&gt;=8.1.3&#xA;  Downloading click-8.1.8-py3-none-any.whl (98 kB)&#xA;Collecting Jinja2&gt;=3.1.2&#xA;  Downloading jinja2-3.1.6-py3-none-any.whl (134 kB)&#xA;Collecting zipp&gt;=3.20&#xA;  Downloading zipp-3.23.1-py3-none-any.whl (10 kB)&#xA;Collecting MarkupSafe&gt;=2.0&#xA;  Downloading markupsafe-3.0.3-cp39-cp39-manylinux2014_x86_64.manylinux_2_17_x86_64.manylinux_2_28_x86_64.whl (20 kB)&#xA;Installing collected packages: zipp, MarkupSafe, Werkzeug, Jinja2, itsdangerous, importlib-metadata, click, blinker, Flask&#xA;Successfully installed Flask-2.3.3 Jinja2-3.1.6 MarkupSafe-3.0.3 Werkzeug-3.1.8 blinker-1.9.0 click-8.1.8 importlib-metadata-8.7.1 itsdangerous-2.2.0 zipp-3.23.1&#xA;WARNING: You are using pip version 21.3.1; however, version 26.0.1 is available.&#xA;You should consider upgrading via the &#39;/opt/app-root/bin/python3.9 -m pip install --upgrade pip&#39; command.&#xA;STEP 7/10: CMD [ &#34;python&#34;, &#34;./app.py&#34; ]&#xA;STEP 8/10: COPY labels.json /usr/share/buildinfo/labels.json&#xA;STEP 9/10: COPY labels.json /root/buildinfo/labels.json&#xA;STEP 10/10: LABEL &#34;architecture&#34;=&#34;x86_64&#34; &#34;vcs-type&#34;=&#34;git&#34; &#34;vcs-ref&#34;=&#34;8db91b08c42f4543dde16ba8ac772c5a35f83632&#34; &#34;org.opencontainers.image.revision&#34;=&#34;8db91b08c42f4543dde16ba8ac772c5a35f83632&#34; &#34;org.opencontainers.image.source&#34;=&#34;https://github.com/redhat-appstudio-qe/sample-multi-component&#34; &#34;quay.expires-after&#34;=&#34;5d&#34; &#34;build-date&#34;=&#34;2026-05-02T05:52:49Z&#34; &#34;org.opencontainers.image.created&#34;=&#34;2026-05-02T05:52:49Z&#34;&#xA;COMMIT quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-8db91b08c42f4543dde16ba8ac772c5a35f83632&#xA;--&gt; 29475068a368&#xA;Successfully tagged quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-8db91b08c42f4543dde16ba8ac772c5a35f83632&#xA;29475068a36850ec74569e2c524bbdbed02fbe3dcc7814641c4ed3edf6d0c4fb&#xA;[2026-05-02T05:53:27,336853436+00:00] Unsetting proxy&#xA;[2026-05-02T05:53:27,338188448+00:00] Add metadata&#xA;Recording base image digests used&#xA;registry.access.redhat.com/ubi9/python-39:1-117.1684741281 registry.access.redhat.com/ubi9/python-39:1-117.1684741281@sha256:40a58935b9c22664927b22bf256f53a3d744ddb7316f3af18061099e199526ee&#xA;Getting image source signatures&#xA;Copying blob sha256:f2b315ae926318259c6690c0a9c37966a04f31da7632672ee908d09bd1cd9887&#xA;Copying blob sha256:bc8a0003b3470be53e5cf295daf38c287d3f20ab90e8f5c2b6f17406b158d323&#xA;Copying blob sha256:d661a108c347030c3ef626a0e0020e084fba1e1023193824f5395fa90ef40bde&#xA;Copying blob sha256:d93d3cc0bc0c5ed9655bcdcf31183ed0b570076c0e6a13e0d7cb907d0b877b00&#xA;Copying blob sha256:629980bfa23ec05ce5acc61ed2866ddf8713f40bb2a61f0850395082f1457220&#xA;Copying config sha256:29475068a36850ec74569e2c524bbdbed02fbe3dcc7814641c4ed3edf6d0c4fb&#xA;Writing manifest to image destination&#xA;[2026-05-02T05:53:59,582127454+00:00] End build&#xA;&#xA;pod: python-component-sukmsc-on-4d00d73d9f32a7889b3519c6da3e8f90-pod | container step-push: &#xA;[2026-05-02T05:53:59,845018994+00:00] Update CA trust&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;[2026-05-02T05:54:21,115361325+00:00] Convert image&#xA;[2026-05-02T05:54:21,205614784+00:00] Push image with unique tag&#xA;Pushing to quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:python-component-sukmsc-on-pull-request-g52js-build-container&#xA;[retry] executing: buildah push --format=docker --retry 3 --tls-verify=true quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-8db91b08c42f4543dde16ba8ac772c5a35f83632 docker://quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:python-component-sukmsc-on-pull-request-g52js-build-container&#xA;Getting image source signatures&#xA;Copying blob sha256:f2b315ae926318259c6690c0a9c37966a04f31da7632672ee908d09bd1cd9887&#xA;Copying blob sha256:bc8a0003b3470be53e5cf295daf38c287d3f20ab90e8f5c2b6f17406b158d323&#xA;Copying blob sha256:d93d3cc0bc0c5ed9655bcdcf31183ed0b570076c0e6a13e0d7cb907d0b877b00&#xA;Copying blob sha256:629980bfa23ec05ce5acc61ed2866ddf8713f40bb2a61f0850395082f1457220&#xA;Copying blob sha256:d661a108c347030c3ef626a0e0020e084fba1e1023193824f5395fa90ef40bde&#xA;Copying config sha256:29475068a36850ec74569e2c524bbdbed02fbe3dcc7814641c4ed3edf6d0c4fb&#xA;Writing manifest to image destination&#xA;[2026-05-02T05:57:04,907067577+00:00] Push image with git revision&#xA;Pushing to quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-8db91b08c42f4543dde16ba8ac772c5a35f83632&#xA;[retry] executing: buildah push --format=docker --retry 3 --tls-verify=true --digestfile /var/workdir/image-digest quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-8db91b08c42f4543dde16ba8ac772c5a35f83632 docker://quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-8db91b08c42f4543dde16ba8ac772c5a35f83632&#xA;Getting image source signatures&#xA;Copying blob sha256:f2b315ae926318259c6690c0a9c37966a04f31da7632672ee908d09bd1cd9887&#xA;Copying blob sha256:bc8a0003b3470be53e5cf295daf38c287d3f20ab90e8f5c2b6f17406b158d323&#xA;Copying blob sha256:629980bfa23ec05ce5acc61ed2866ddf8713f40bb2a61f0850395082f1457220&#xA;Copying blob sha256:d661a108c347030c3ef626a0e0020e084fba1e1023193824f5395fa90ef40bde&#xA;Copying blob sha256:d93d3cc0bc0c5ed9655bcdcf31183ed0b570076c0e6a13e0d7cb907d0b877b00&#xA;Copying config sha256:29475068a36850ec74569e2c524bbdbed02fbe3dcc7814641c4ed3edf6d0c4fb&#xA;Writing manifest to image destination&#xA;sha256:b4bae6cd649fa727918fa00bbf740a7fdd429feb319a7b56f28fed4c5c2b1901quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-8db91b08c42f4543dde16ba8ac772c5a35f83632&#xA;[retry] executing: kubectl get configmap cluster-config -n konflux-info -o json&#xA;Keyless signing is disabled (none of rekorInternalUrl, fulcioInternalUrl, defaultOIDCIssuer, tufInternalUrl are configured in the konflux-info/cluster-config configmap)&#xA;[2026-05-02T05:57:08,606835009+00:00] End push&#xA;&#xA;pod: python-component-sukmsc-on-4d00d73d9f32a7889b3519c6da3e8f90-pod | container step-sbom-syft-generate: &#xA;[2026-05-02T05:57:09,063329790+00:00] Generate SBOM&#xA;Running syft on the image&#xA;Running syft on the source code&#xA;[0000]  WARN no explicit name and version provided for directory source, deriving artifact ID from the given path (which is not ideal)&#xA;[2026-05-02T05:58:32,512978304+00:00] End sbom-syft-generate&#xA;&#xA;pod: python-component-sukmsc-on-4d00d73d9f32a7889b3519c6da3e8f90-pod | container step-prepare-sboms: &#xA;[2026-05-02T05:58:32,618867256+00:00] Prepare SBOM&#xA;[2026-05-02T05:58:32,692874202+00:00] Generate SBOM with mobster&#xA;Skipping SBOM validation&#xA;2026-05-02 05:58:41,896 [INFO] mobster.log: Logging level set to 20&#xA;2026-05-02 05:58:45,696 [INFO] mobster.oci: Fetching manifest for registry.access.redhat.com/ubi9/python-39@sha256:40a58935b9c22664927b22bf256f53a3d744ddb7316f3af18061099e199526ee&#xA;2026-05-02 05:58:47,696 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi9/python-39@sha256:c62e9c0b7ec343ee4b0e0c695a3c8d42d8070e0b9a752079830be0892dc1f89d with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-02 05:58:48,336 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi9/python-39@sha256:c62e9c0b7ec343ee4b0e0c695a3c8d42d8070e0b9a752079830be0892dc1f89d with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-02 05:58:49,652 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi9/python-39@sha256:c62e9c0b7ec343ee4b0e0c695a3c8d42d8070e0b9a752079830be0892dc1f89d with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-02 05:58:50,233 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi9/python-39@sha256:c62e9c0b7ec343ee4b0e0c695a3c8d42d8070e0b9a752079830be0892dc1f89d with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-02 05:58:51,569 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi9/python-39@sha256:c62e9c0b7ec343ee4b0e0c695a3c8d42d8070e0b9a752079830be0892dc1f89d with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-02 05:58:52,156 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi9/python-39@sha256:c62e9c0b7ec343ee4b0e0c695a3c8d42d8070e0b9a752079830be0892dc1f89d with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-02 05:58:53,469 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi9/python-39@sha256:c62e9c0b7ec343ee4b0e0c695a3c8d42d8070e0b9a752079830be0892dc1f89d with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-02 05:58:54,034 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi9/python-39@sha256:c62e9c0b7ec343ee4b0e0c695a3c8d42d8070e0b9a752079830be0892dc1f89d with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-02 05:58:54,035 [INFO] mobster.cmd.generate.oci_image.contextual_sbom.contextualize: Contextual mechanism won&#39;t be used, there is no parent image SBOM.&#xA;2026-05-02 05:58:54,035 [INFO] mobster.cmd.generate.oci_image: Contextual SBOM workflow finished successfully.&#xA;2026-05-02 05:58:54,037 [INFO] mobster.log: Contextual workflow completed in 9.24s&#xA;2026-05-02 05:58:55,092 [INFO] mobster.main: Exiting with code 0.&#xA;[2026-05-02T05:58:56,090634635+00:00] End prepare-sboms&#xA;&#xA;pod: python-component-sukmsc-on-4d00d73d9f32a7889b3519c6da3e8f90-pod | container step-upload-sbom: &#xA;[2026-05-02T05:58:56,181810163+00:00] Upload SBOM&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc&#xA;Pushing sbom to registry&#xA;[retry] executing: cosign attach sbom --sbom sbom.json --type spdx quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-8db91b08c42f4543dde16ba8ac772c5a35f83632@sha256:b4bae6cd649fa727918fa00bbf740a7fdd429feb319a7b56f28fed4c5c2b1901&#xA;WARNING: SBOM attachments are deprecated and support will be removed in a Cosign release soon after 2024-02-22 (see https://github.com/sigstore/cosign/issues/2755). Instead, please use SBOM attestations.&#xA;WARNING: Attaching SBOMs this way does not sign them. To sign them, use &#39;cosign attest --predicate sbom.json --key &lt;key path&gt;&#39;.&#xA;Uploading SBOM file for [quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc@sha256:b4bae6cd649fa727918fa00bbf740a7fdd429feb319a7b56f28fed4c5c2b1901] to [quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:sha256-b4bae6cd649fa727918fa00bbf740a7fdd429feb319a7b56f28fed4c5c2b1901.sbom] with mediaType [text/spdx+json].&#xA;&#xA;quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc@sha256:fea996e206ea3628b6dcbd9fccf05cd97d395af3797784d760d24e83a9d8212a&#xA;[2026-05-02T05:59:20,203347913+00:00] End upload-sbom&#xA;&#xA; pod: python-component-sukmsc-on-5d59478b4adaff39dfc472dd85e990e0-pod | init container: prepare&#xA;2026/05/02 05:59:39 Entrypoint initialization&#xA;&#xA; pod: python-component-sukmsc-on-5d59478b4adaff39dfc472dd85e990e0-pod | init container: place-scripts&#xA;2026/05/02 05:59:40 Decoded script /tekton/scripts/script-1-j656c&#xA;2026/05/02 05:59:40 Decoded script /tekton/scripts/script-2-q76zc&#xA;&#xA;pod: python-component-sukmsc-on-5d59478b4adaff39dfc472dd85e990e0-pod | container step-use-trusted-artifact: &#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc&#xA;Executing: oras blob fetch --registry-config /tmp/use-oci.sh.sav1vu/auth-jGXazW.json quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc@sha256:1be8c6571584be9aeebd552893a68dbc5fc5bf91179437d45cfc9f406a8e597b --output -&#xA;Restored artifact quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc@sha256:1be8c6571584be9aeebd552893a68dbc5fc5bf91179437d45cfc9f406a8e597b to /var/workdir/source&#xA;WARN: artifact URI not provided, (given: =/var/workdir/cachi2)&#xA;&#xA;&#xA;pod: python-component-sukmsc-on-5d59478b4adaff39dfc472dd85e990e0-pod | container step-sast-shell-check: &#xA;+ source /utils.sh&#xA;++ OPM_RENDER_CACHE=/tmp/konflux-test-opm-cache&#xA;++ DEFAULT_INDEX_IMAGE=registry.redhat.io/redhat/redhat-operator-index&#xA;+ trap &#39;handle_error /tekton/results/TEST_OUTPUT&#39; EXIT&#xA;+ [[ -z &#39;&#39; ]]&#xA;+ PROJECT_NAME=python-component-sukmsc&#xA;+ echo &#39;INFO: The PROJECT_NAME used is: python-component-sukmsc&#39;&#xA;+ ca_bundle=/mnt/trusted-ca/ca-bundle.crt&#xA;+ &#39;[&#39; -f /mnt/trusted-ca/ca-bundle.crt &#39;]&#39;&#xA;+ echo &#39;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#39;&#xA;+ cp -vf /mnt/trusted-ca/ca-bundle.crt /etc/pki/ca-trust/source/anchors&#xA;INFO: The PROJECT_NAME used is: python-component-sukmsc&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;+ update-ca-trust&#xA;++ rpm -q --queryformat &#39;%{NAME}-%{VERSION}-%{RELEASE}\n&#39; ShellCheck&#xA;+ PACKAGE_VERSION=ShellCheck-0.10.0-3.el9&#xA;+ OUTPUT_FILE=shellcheck-results.json&#xA;+ SOURCE_CODE_DIR=/var/workdir/source&#xA;+ declare -a ALL_TARGETS&#xA;+ IFS=,&#xA;+ read -ra TARGET_ARRAY&#xA;+ for d in &#34;${TARGET_ARRAY[@]}&#34;&#xA;+ potential_path=/var/workdir/source/.&#xA;++ realpath -m /var/workdir/source/.&#xA;+ resolved_path=/var/workdir/source&#xA;+ [[ /var/workdir/source == \/\v\a\r\/\w\o\r\k\d\i\r\/\s\o\u\r\c\e* ]]&#xA;+ ALL_TARGETS+=(&#34;$resolved_path&#34;)&#xA;+ &#39;[&#39; -z &#39;&#39; &#39;]&#39;&#xA;+ &#39;[&#39; -r /sys/fs/cgroup/cpu.max &#39;]&#39;&#xA;+ read -r quota period&#xA;+ &#39;[&#39; 12800 &#39;!=&#39; max &#39;]&#39;&#xA;+ &#39;[&#39; -n 100000 &#39;]&#39;&#xA;+ &#39;[&#39; 100000 -gt 0 &#39;]&#39;&#xA;+ export SC_JOBS=1&#xA;+ SC_JOBS=1&#xA;+ echo &#39;INFO: Setting SC_JOBS=1 based on cgroups v2 max for run-shellcheck.sh&#39;&#xA;+ /usr/share/csmock/scripts/run-shellcheck.sh /var/workdir/source&#xA;INFO: Setting SC_JOBS=1 based on cgroups v2 max for run-shellcheck.sh&#xA;Looking for shell scripts................ done&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/applypatch-msg.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/commit-msg.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/post-update.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/prepare-commit-msg.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-applypatch.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-commit.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-merge-commit.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-push.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-rebase.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-receive.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/push-to-checkout.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/sendemail-validate.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/update.sample&#xA;+ CSGREP_OPTS=(--mode=json --strip-path-prefix=&#34;$SOURCE_CODE_DIR&#34;/ --remove-duplicates --embed-context=3 --set-scan-prop=&#34;ShellCheck:${PACKAGE_VERSION}&#34;)&#xA;+ [[ true == \t\r\u\e ]]&#xA;+ CSGREP_EVENT_FILTER=&#39;\[SC(1020|1035|1054|1066|1068|1073|1080|1083|1099|1113|1115|1127|1128|1143|2043|2050|&#39;&#xA;+ CSGREP_EVENT_FILTER+=&#39;2055|2057|2066|2069|2071|2077|2078|2091|2092|2157|2171|2193|2194|2195|2215|2216|&#39;&#xA;+ CSGREP_EVENT_FILTER+=&#39;2218|2224|2225|2242|2256|2258|2261)\]$&#39;&#xA;+ CSGREP_OPTS+=(--event=&#34;$CSGREP_EVENT_FILTER&#34;)&#xA;+ csgrep --mode=json --strip-path-prefix=/var/workdir/source/ --remove-duplicates --embed-context=3 --set-scan-prop=ShellCheck:ShellCheck-0.10.0-3.el9 &#39;--event=\[SC(1020|1035|1054|1066|1068|1073|1080|1083|1099|1113|1115|1127|1128|1143|2043|2050|2055|2057|2066|2069|2071|2077|2078|2091|2092|2157|2171|2193|2194|2195|2215|2216|2218|2224|2225|2242|2256|2258|2261)\]$&#39; ./shellcheck-results/empty.json ./shellcheck-results/sc-104.json ./shellcheck-results/sc-110.json ./shellcheck-results/sc-116.json ./shellcheck-results/sc-122.json ./shellcheck-results/sc-128.json ./shellcheck-results/sc-134.json ./shellcheck-results/sc-140.json ./shellcheck-results/sc-151.json ./shellcheck-results/sc-82.json ./shellcheck-results/sc-98.json&#xA;+ [[ SITE_DEFAULT == \S\I\T\E\_\D\E\F\A\U\L\T ]]&#xA;+ KFP_GIT_URL=https://gitlab.cee.redhat.com/osh/known-false-positives.git&#xA;+ PROBE_URL=https://gitlab.cee.redhat.com/osh/known-false-positives&#xA;+ KFP_DIR=known-false-positives&#xA;+ KFP_CLONED=0&#xA;+ mkdir known-false-positives&#xA;+ [[ -n https://gitlab.cee.redhat.com/osh/known-false-positives.git ]]&#xA;+ echo -n &#39;INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... &#39;&#xA;+ curl --fail --head --max-time 60 --no-progress-meter https://gitlab.cee.redhat.com/osh/known-false-positives&#xA;++ head -1&#xA;curl: (6) Could not resolve host: gitlab.cee.redhat.com&#xA;+ [[ 0 -eq 0 ]]&#xA;+ echo &#39;WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered&#39;&#xA;INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered&#xA;ShellCheck results have been saved to shellcheck-results.json&#xA;+ echo &#39;ShellCheck results have been saved to shellcheck-results.json&#39;&#xA;+ csgrep --mode=evtstat shellcheck-results.json&#xA;+ csgrep --mode=sarif shellcheck-results.json&#xA;+ TEST_OUTPUT=&#xA;+ parse_test_output sast-shell-check-oci-ta-min sarif shellcheck-results.sarif&#xA;+ TEST_NAME=sast-shell-check-oci-ta-min&#xA;+ TEST_RESULT_FORMAT=sarif&#xA;+ TEST_RESULT_FILE=shellcheck-results.sarif&#xA;+ &#39;[&#39; -z sast-shell-check-oci-ta-min &#39;]&#39;&#xA;+ &#39;[&#39; -z sarif &#39;]&#39;&#xA;+ &#39;[&#39; -z shellcheck-results.sarif &#39;]&#39;&#xA;+ &#39;[&#39; &#39;!&#39; -f shellcheck-results.sarif &#39;]&#39;&#xA;+ &#39;[&#39; sarif = sarif &#39;]&#39;&#xA;+++ jq -rce &#39;(if (.runs[].results | length &gt; 0) then &#34;FAILURE&#34; else &#34;SUCCESS&#34; end)&#39; shellcheck-results.sarif&#xA;+++ jq -rce &#39;(.runs[].results | length)&#39; shellcheck-results.sarif&#xA;++ make_result_json -r SUCCESS -f 0&#xA;++ local RESULT=&#xA;++ local SUCCESSES=0&#xA;++ local FAILURES=0&#xA;++ local WARNINGS=0&#xA;++ local &#39;NOTE=For details, check Tekton task log.&#39;&#xA;++ local NAMESPACE=default&#xA;++ local OUTPUT&#xA;++ local OPTIND opt&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ RESULT=SUCCESS&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ FAILURES=0&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ shift 4&#xA;++ &#39;[&#39; -z SUCCESS &#39;]&#39;&#xA;++ case &#34;${RESULT}&#34; in&#xA;++++ date -u --iso-8601=seconds&#xA;+++ jq -rce --arg date 2026-05-02T05:59:51+00:00 --arg result SUCCESS --arg note &#39;For details, check Tekton task log.&#39; --arg namespace default --arg successes 0 --arg failures 0 --arg warnings 0 --null-input &#39;{  result: $result,&#xA;        timestamp: $date,&#xA;        note: $note,&#xA;        namespace: $namespace,&#xA;        successes: $successes|tonumber,&#xA;        failures: $failures|tonumber,&#xA;        warnings: $warnings|tonumber&#xA;    }&#39;&#xA;++ OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-02T05:59:51+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;++ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-02T05:59:51+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ TEST_OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-02T05:59:51+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;++ jq .failures&#xA;++ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-02T05:59:51+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ &#39;[&#39; 0 -gt 0 &#39;]&#39;&#xA;+ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-02T05:59:51+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ tee /tekton/results/TEST_OUTPUT&#xA;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-02T05:59:51+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;+ handle_error /tekton/results/TEST_OUTPUT&#xA;+ exit_code=0&#xA;+ &#39;[&#39; 0 -ne 0 &#39;]&#39;&#xA;+ exit 0&#xA;&#xA;pod: python-component-sukmsc-on-5d59478b4adaff39dfc472dd85e990e0-pod | container step-upload: &#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc&#xA;Attaching to quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-8db91b08c42f4543dde16ba8ac772c5a35f83632&#xA;Executing: oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/sarif+json quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-8db91b08c42f4543dde16ba8ac772c5a35f83632@sha256:b4bae6cd649fa727918fa00bbf740a7fdd429feb319a7b56f28fed4c5c2b1901 shellcheck-results.sarif:application/sarif+json&#xA;Preparing shellcheck-results.sarif&#xA;Exists    44136fa355b3 application/vnd.oci.empty.v1+json&#xA;Uploading da808faebf6f shellcheck-results.sarif&#xA;Uploaded  da808faebf6f shellcheck-results.sarif&#xA;Uploading f94ede8a8b8e application/vnd.oci.image.manifest.v1+json&#xA;Uploaded  f94ede8a8b8e application/vnd.oci.image.manifest.v1+json&#xA;Attached to [registry] quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-8db91b08c42f4543dde16ba8ac772c5a35f83632@sha256:b4bae6cd649fa727918fa00bbf740a7fdd429feb319a7b56f28fed4c5c2b1901&#xA;Digest: sha256:f94ede8a8b8e6ce081151482edf3250cbcad4225e23f88c6a07377212ada14ec&#xA;No excluded-findings.json exists. Skipping upload.&#xA;&#xA; pod: python-component-sukmsc-on-94ac859697020ff4181a1de79af46382-pod | init container: prepare&#xA;2026/05/02 05:59:21 Entrypoint initialization&#xA;&#xA; pod: python-component-sukmsc-on-94ac859697020ff4181a1de79af46382-pod | init container: place-scripts&#xA;2026/05/02 05:59:22 Decoded script /tekton/scripts/script-0-nb62r&#xA;2026/05/02 05:59:22 Decoded script /tekton/scripts/script-1-z9b7q&#xA;2026/05/02 05:59:22 Decoded script /tekton/scripts/script-2-zxhm6&#xA;&#xA;pod: python-component-sukmsc-on-94ac859697020ff4181a1de79af46382-pod | container step-build: &#xA;[2026-05-02T05:59:25,287927133+00:00] Update CA trust&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;Running konflux-build-cli&#xA;time=&#34;2026-05-02T05:59:27Z&#34; level=info msg=&#34;[param] image: quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-8db91b08c42f4543dde16ba8ac772c5a35f83632&#34;&#xA;time=&#34;2026-05-02T05:59:27Z&#34; level=info msg=&#34;[param] images: [quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-8db91b08c42f4543dde16ba8ac772c5a35f83632@sha256:b4bae6cd649fa727918fa00bbf740a7fdd429feb319a7b56f28fed4c5c2b1901]&#34;&#xA;time=&#34;2026-05-02T05:59:27Z&#34; level=info msg=&#34;[param] buildah-format: docker&#34;&#xA;time=&#34;2026-05-02T05:59:27Z&#34; level=info msg=&#34;[param] always-build-index: false&#34;&#xA;time=&#34;2026-05-02T05:59:27Z&#34; level=info msg=&#34;[param] additional-tags: [python-component-sukmsc-on-pull-request-g52js-build-image-index]&#34;&#xA;time=&#34;2026-05-02T05:59:27Z&#34; level=info msg=&#34;[param] output-manifest-path: /index-build-data/manifest_data.json&#34;&#xA;time=&#34;2026-05-02T05:59:27Z&#34; level=info msg=&#34;[param] result-path-image-digest: /tekton/results/IMAGE_DIGEST&#34;&#xA;time=&#34;2026-05-02T05:59:27Z&#34; level=info msg=&#34;[param] result-path-image-url: /tekton/results/IMAGE_URL&#34;&#xA;time=&#34;2026-05-02T05:59:27Z&#34; level=info msg=&#34;[param] result-path-image-ref: /tekton/results/IMAGE_REF&#34;&#xA;time=&#34;2026-05-02T05:59:27Z&#34; level=info msg=&#34;[param] result-path-images: /tekton/results/IMAGES&#34;&#xA;time=&#34;2026-05-02T05:59:27Z&#34; level=info msg=&#34;Creating manifest list: quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-8db91b08c42f4543dde16ba8ac772c5a35f83632&#34;&#xA;time=&#34;2026-05-02T05:59:27Z&#34; level=info msg=&#34;buildah [stdout] b165cdbd5841549a9d616c2cb9c8f17bc5088da3472d2e350f6908037cf0f671&#34; logger=CliExecutor&#xA;time=&#34;2026-05-02T05:59:27Z&#34; level=info msg=&#34;Skipping image index generation. Returning results for single image.&#34;&#xA;{&#34;image_digest&#34;:&#34;sha256:b4bae6cd649fa727918fa00bbf740a7fdd429feb319a7b56f28fed4c5c2b1901&#34;,&#34;image_url&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-8db91b08c42f4543dde16ba8ac772c5a35f83632&#34;,&#34;image_ref&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc@sha256:b4bae6cd649fa727918fa00bbf740a7fdd429feb319a7b56f28fed4c5c2b1901&#34;,&#34;images&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc@sha256:b4bae6cd649fa727918fa00bbf740a7fdd429feb319a7b56f28fed4c5c2b1901&#34;}&#xA;pod: python-component-sukmsc-on-94ac859697020ff4181a1de79af46382-pod | container step-create-sbom: &#xA;The manifest_data.json file does not exist. Skipping the SBOM creation...&#xA;&#xA;pod: python-component-sukmsc-on-94ac859697020ff4181a1de79af46382-pod | container step-upload-sbom: &#xA;[2026-05-02T05:59:28,533867496+00:00] Update CA trust&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;The index.spdx.json file does not exists. Skipping the SBOM upload...&#xA;&#xA; pod: python-component-sukmsc-on-bb34c14ac77aa05141258312a302cdfb-pod | init container: prepare&#xA;2026/05/02 05:51:53 Entrypoint initialization&#xA;&#xA; pod: python-component-sukmsc-on-bb34c14ac77aa05141258312a302cdfb-pod | init container: place-scripts&#xA;2026/05/02 05:51:53 Decoded script /tekton/scripts/script-0-dgv45&#xA;2026/05/02 05:51:53 Decoded script /tekton/scripts/script-1-c4llc&#xA;&#xA;pod: python-component-sukmsc-on-bb34c14ac77aa05141258312a302cdfb-pod | container step-clone: &#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1777701115.8954604,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1777701116.3408427,&#34;caller&#34;:&#34;git/git.go:223&#34;,&#34;msg&#34;:&#34;Successfully cloned https://github.com/redhat-appstudio-qe/sample-multi-component @ 8db91b08c42f4543dde16ba8ac772c5a35f83632 (grafted, HEAD) in path /var/workdir/source&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1777701116.340888,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1777701116.3651013,&#34;caller&#34;:&#34;git/git.go:277&#34;,&#34;msg&#34;:&#34;Successfully initialized and updated submodules in path /var/workdir/source&#34;}&#xA;Merge option disabled. Using checked-out revision 8db91b08c42f4543dde16ba8ac772c5a35f83632 directly.&#xA;&#xA;pod: python-component-sukmsc-on-bb34c14ac77aa05141258312a302cdfb-pod | container step-symlink-check: &#xA;Running symlink check&#xA;&#xA;pod: python-component-sukmsc-on-bb34c14ac77aa05141258312a302cdfb-pod | container step-create-trusted-artifact: &#xA;Prepared artifact from /var/workdir/source (sha256:1be8c6571584be9aeebd552893a68dbc5fc5bf91179437d45cfc9f406a8e597b)&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc&#xA;Executing: oras push --annotation=quay.expires-after=5d --registry-config /tmp/create-oci.sh.QZcEwi/auth-021OzT.json quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-8db91b08c42f4543dde16ba8ac772c5a35f83632.git SOURCE_ARTIFACT&#xA;Uploading 1be8c6571584 SOURCE_ARTIFACT&#xA;Uploaded  1be8c6571584 SOURCE_ARTIFACT&#xA;Pushed [registry] quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-8db91b08c42f4543dde16ba8ac772c5a35f83632.git&#xA;ArtifactType: application/vnd.unknown.artifact.v1&#xA;Digest: sha256:504da778335f1f8bfdcb4854026c24de604ea3236045198f01a44aa158e400a9&#xA;Artifacts created&#xA;&#xA;&#xA; pod: python-component-sukmsc-on-pull-request-g52js-clamav-scan-pod | init container: prepare&#xA;2026/05/02 05:59:32 Entrypoint initialization&#xA;&#xA; pod: python-component-sukmsc-on-pull-request-g52js-clamav-scan-pod | init container: place-scripts&#xA;2026/05/02 05:59:39 Decoded script /tekton/scripts/script-0-ccthk&#xA;2026/05/02 05:59:39 Decoded script /tekton/scripts/script-1-7979g&#xA;&#xA;pod: python-component-sukmsc-on-pull-request-g52js-clamav-scan-pod | container step-extract-and-scan-image: &#xA;Starting clamd ...&#xA;clamd is ready!&#xA;Detecting artifact type for quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc@sha256:b4bae6cd649fa727918fa00bbf740a7fdd429feb319a7b56f28fed4c5c2b1901.&#xA;Detected container image. Processing image manifests.&#xA;Running &#34;oc image extract&#34; on image of arch amd64&#xA;error: unable to extract layer sha256:061494b16a3e082ac22c3159029d7399a8b153778d0435e438bfdcc22f203bc8 from quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc@sha256:b4bae6cd649fa727918fa00bbf740a7fdd429feb319a7b56f28fed4c5c2b1901: unexpected EOF&#xA;info: Retrying again in 5 seconds...&#xA;error: directory /work/content/content-amd64 must be empty, pass --confirm to overwrite contents of directory&#xA;info: Retrying again in 5 seconds...&#xA;error: directory /work/content/content-amd64 must be empty, pass --confirm to overwrite contents of directory&#xA;info: Retrying again in 5 seconds...&#xA;error: directory /work/content/content-amd64 must be empty, pass --confirm to overwrite contents of directory&#xA;{&#34;result&#34;:&#34;ERROR&#34;,&#34;timestamp&#34;:&#34;2026-05-02T06:00:25+00:00&#34;,&#34;note&#34;:&#34;Unexpected error: Script errored at command: return \&#34;${status}\&#34;.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;&#xA;pod: python-component-sukmsc-on-pull-request-g52js-clamav-scan-pod | container step-upload: &#xA;No files found. Skipping upload.&#xA;&#xA; pod: python-component-sukmsc-on-pull-request-g52js-init-pod | init container: prepare&#xA;2026/05/02 05:51:48 Entrypoint initialization&#xA;&#xA;pod: python-component-sukmsc-on-pull-request-g52js-init-pod | container step-init: &#xA;time=&#34;2026-05-02T05:51:50Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-05-02T05:51:50Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-05-02T05:51:50Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-05-02T05:51:50Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-05-02T05:51:50Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-05-02T05:51:50Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-02T05:51:50Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-05-02T05:51:50Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-05-02T05:51:50Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;&#xA; pod: python-component-sukmsc-on-pull-request-g52js-tpa-scan-pod | init container: prepare&#xA;2026/05/02 05:59:47 Entrypoint initialization&#xA;&#xA; pod: python-component-sukmsc-on-pull-request-g52js-tpa-scan-pod | init container: place-scripts&#xA;2026/05/02 05:59:48 Decoded script /tekton/scripts/script-0-9gzc2&#xA;2026/05/02 05:59:48 Decoded script /tekton/scripts/script-1-brlpt&#xA;2026/05/02 05:59:48 Decoded script /tekton/scripts/script-2-q975v&#xA;&#xA;pod: python-component-sukmsc-on-pull-request-g52js-tpa-scan-pod | container step-get-vulnerabilities: &#xA;Inspecting raw image manifest quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc@sha256:b4bae6cd649fa727918fa00bbf740a7fdd429feb319a7b56f28fed4c5c2b1901.&#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc&#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc&#xA;WARNING: SBOM attachments are deprecated and support will be removed in a Cosign release soon after 2024-02-22 (see https://github.com/sigstore/cosign/issues/2755). Instead, please use SBOM attestations.&#xA;WARNING: Downloading SBOMs this way does not ensure its authenticity. If you want to ensure a tamper-proof SBOM, download it using &#39;cosign download attestation &lt;image uri&gt;&#39;.&#xA;Found SBOM of media type: text/spdx+json&#xA;Running TPA scan on amd64 image manifest...&#xA;  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current&#xA;                                 Dload  Upload   Total   Spent    Left  Speed&#xA;{&#xA;  &#34;scanned&#34; : {&#xA;    &#34;total&#34; : 787,&#xA;    &#34;direct&#34; : 363,&#xA;    &#34;transitive&#34; : 424&#xA;  },&#xA;  &#34;providers&#34; : {&#xA;    &#34;rhtpa&#34; : {&#xA;      &#34;status&#34; : {&#xA;        &#34;ok&#34; : true,&#xA;        &#34;name&#34; : &#34;rhtpa&#34;,&#xA;        &#34;code&#34; : 200,&#xA;        &#34;message&#34; : &#34;OK&#34;,&#xA;        &#34;warnings&#34; : { }&#xA;      },&#xA;      &#34;sources&#34; : {&#xA;        &#34;osv-github&#34; : {&#xA;          &#34;summary&#34; : {&#xA;            &#34;direct&#34; : 24,&#xA;            &#34;transitive&#34; : 6,&#xA;            &#34;total&#34; : 30,&#xA;            &#34;dependencies&#34; : 15,&#xA;            &#34;critical&#34; : 0,&#xA;            &#34;high&#34; : 13,&#xA;            &#34;medium&#34; : 14,&#xA;            &#34;low&#34; : 3,&#xA;            &#34;remediations&#34; : 0,&#xA;            &#34;recommendations&#34; : 0,&#xA;            &#34;unscanned&#34; : 0&#xA;          },&#xA;          &#34;dependencies&#34; : [ {&#xA;            &#34;ref&#34; : &#34;pkg:pypi/setuptools@53.0.0&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;              &#34;source&#34; : &#34;osv-github&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2022-40897&#34;,&#xA;              &#34;source&#34; : &#34;osv-github&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2022-40897&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:pypi/pip@21.3.1&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-5752&#34;,&#xA;                &#34;source&#34; : &#34;osv-github&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5752&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-5752&#34;,&#xA;                &#34;source&#34; : &#34;osv-github&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5752&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;              &#34;source&#34; : &#34;osv-github&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:npm/tar@6.1.11&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2026-23950&#34;,&#xA;              &#34;source&#34; : &#34;osv-github&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-23950&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-24842&#34;,&#xA;              &#34;source&#34; : &#34;osv-github&#34;,&#xA;              &#34;cvssScore&#34; : 8.2,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-24842&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-26960&#34;,&#xA;              &#34;source&#34; : &#34;osv-github&#34;,&#xA;              &#34;cvssScore&#34; : 7.1,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-26960&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-28863&#34;,&#xA;              &#34;title&#34; : &#34;node-tar vulnerable to denial of service while parsing a tar file due to lack of folders count validation&#34;,&#xA;              &#34;source&#34; : &#34;osv-github&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-28863&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2026-23950&#34;,&#xA;              &#34;source&#34; : &#34;osv-github&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-23950&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:npm/ip@2.0.0&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2024-29415&#34;,&#xA;              &#34;title&#34; : &#34;The ip package through 2.0.1 for Node.js might allow SSRF because some IP addresses (such as 127.1, 01200034567, 012.1.2.3, 000:0:0000::01, and ::fFFf:127.0.0.1) are improperly categorized as globally routable via isPublic. NOTE: this issue exists because of an incomplete fix for CVE-2023-42282.&#34;,&#xA;              &#34;source&#34; : &#34;osv-github&#34;,&#xA;              &#34;cvssScore&#34; : 8.1,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-29415&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-29415&#34;,&#xA;              &#34;title&#34; : &#34;The ip package through 2.0.1 for Node.js might allow SSRF because some IP addresses (such as 127.1, 01200034567, 012.1.2.3, 000:0:0000::01, and ::fFFf:127.0.0.1) are improperly categorized as globally routable via isPublic. NOTE: this issue exists because of an incomplete fix for CVE-2023-42282.&#34;,&#xA;              &#34;source&#34; : &#34;osv-github&#34;,&#xA;              &#34;cvssScore&#34; : 8.1,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-29415&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:npm/minimatch@5.1.0&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2026-27903&#34;,&#xA;              &#34;source&#34; : &#34;osv-github&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-27903&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-27904&#34;,&#xA;              &#34;source&#34; : &#34;osv-github&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-27904&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2026-27903&#34;,&#xA;              &#34;source&#34; : &#34;osv-github&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-27903&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:pypi/requests@2.25.1&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2023-32681&#34;,&#xA;              &#34;title&#34; : &#34;Unintended leak of Proxy-Authorization header in requests&#34;,&#xA;              &#34;source&#34; : &#34;osv-github&#34;,&#xA;              &#34;cvssScore&#34; : 6.1,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-32681&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-35195&#34;,&#xA;              &#34;title&#34; : &#34;Requests `Session` object does not verify requests after making first request with verify=False&#34;,&#xA;              &#34;source&#34; : &#34;osv-github&#34;,&#xA;              &#34;cvssScore&#34; : 5.6,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-35195&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-47081&#34;,&#xA;              &#34;title&#34; : &#34;Requests vulnerable to .netrc credentials leak via malicious URLs&#34;,&#xA;              &#34;source&#34; : &#34;osv-github&#34;,&#xA;              &#34;cvssScore&#34; : 5.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-47081&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-25645&#34;,&#xA;              &#34;title&#34; : &#34;Requests has Insecure Temp File Reuse in its extract_zipped_paths() utility function&#34;,&#xA;              &#34;source&#34; : &#34;osv-github&#34;,&#xA;              &#34;cvssScore&#34; : 4.4,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-25645&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:pypi/urllib3@1.26.5&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-21441&#34;,&#xA;                &#34;source&#34; : &#34;osv-github&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-21441&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-43804&#34;,&#xA;                &#34;source&#34; : &#34;osv-github&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43804&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-50181&#34;,&#xA;                &#34;source&#34; : &#34;osv-github&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-50181&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37891&#34;,&#xA;                &#34;source&#34; : &#34;osv-github&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37891&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-45803&#34;,&#xA;                &#34;source&#34; : &#34;osv-github&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-45803&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-21441&#34;,&#xA;                &#34;source&#34; : &#34;osv-github&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-21441&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:pypi/idna@2.10&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-3651&#34;,&#xA;                &#34;source&#34; : &#34;osv-github&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3651&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-3651&#34;,&#xA;                &#34;source&#34; : &#34;osv-github&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3651&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2026-21441&#34;,&#xA;              &#34;source&#34; : &#34;osv-github&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-21441&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:npm/semver@7.3.7&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2022-25883&#34;,&#xA;              &#34;title&#34; : &#34;Versions of the package semver before 7.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.\r\r\r&#34;,&#xA;              &#34;source&#34; : &#34;osv-github&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2022-25883&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2022-25883&#34;,&#xA;              &#34;title&#34; : &#34;Versions of the package semver before 7.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.\r\r\r&#34;,&#xA;              &#34;source&#34; : &#34;osv-github&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2022-25883&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:npm/minimatch@3.1.2&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2026-27903&#34;,&#xA;              &#34;source&#34; : &#34;osv-github&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-27903&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-27904&#34;,&#xA;              &#34;source&#34; : &#34;osv-github&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-27904&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2026-27903&#34;,&#xA;              &#34;source&#34; : &#34;osv-github&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-27903&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:npm/npm@8.19.3&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2026-0775&#34;,&#xA;              &#34;source&#34; : &#34;osv-github&#34;,&#xA;              &#34;cvssScore&#34; : 7.0,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-0775&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2026-0775&#34;,&#xA;              &#34;source&#34; : &#34;osv-github&#34;,&#xA;              &#34;cvssScore&#34; : 7.0,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-0775&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:npm/brace-expansion@1.1.11&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2026-33750&#34;,&#xA;              &#34;title&#34; : &#34;brace-expansion: Zero-step sequence causes process hang and memory exhaustion&#34;,&#xA;              &#34;source&#34; : &#34;osv-github&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-33750&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-5889&#34;,&#xA;              &#34;title&#34; : &#34;juliangruber brace-expansion index.js expand redos&#34;,&#xA;              &#34;source&#34; : &#34;osv-github&#34;,&#xA;              &#34;cvssScore&#34; : 3.1,&#xA;              &#34;severity&#34; : &#34;LOW&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-5889&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2026-33750&#34;,&#xA;              &#34;title&#34; : &#34;brace-expansion: Zero-step sequence causes process hang and memory exhaustion&#34;,&#xA;              &#34;source&#34; : &#34;osv-github&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-33750&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:npm/brace-expansion@2.0.1&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2026-33750&#34;,&#xA;              &#34;title&#34; : &#34;brace-expansion: Zero-step sequence causes process hang and memory exhaustion&#34;,&#xA;              &#34;source&#34; : &#34;osv-github&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-33750&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-5889&#34;,&#xA;              &#34;title&#34; : &#34;juliangruber brace-expansion index.js expand redos&#34;,&#xA;              &#34;source&#34; : &#34;osv-github&#34;,&#xA;              &#34;cvssScore&#34; : 3.1,&#xA;              &#34;severity&#34; : &#34;LOW&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-5889&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2026-33750&#34;,&#xA;              &#34;title&#34; : &#34;brace-expansion: Zero-step sequence causes process hang and memory exhaustion&#34;,&#xA;              &#34;source&#34; : &#34;osv-github&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-33750&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:pypi/idna@2.10&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2024-3651&#34;,&#xA;              &#34;source&#34; : &#34;osv-github&#34;,&#xA;              &#34;cvssScore&#34; : 6.2,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-3651&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-3651&#34;,&#xA;              &#34;source&#34; : &#34;osv-github&#34;,&#xA;              &#34;cvssScore&#34; : 6.2,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-3651&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:pypi/pip@21.2.3&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2023-5752&#34;,&#xA;              &#34;source&#34; : &#34;osv-github&#34;,&#xA;              &#34;cvssScore&#34; : 5.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-5752&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2023-5752&#34;,&#xA;              &#34;source&#34; : &#34;osv-github&#34;,&#xA;              &#34;cvssScore&#34; : 5.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-5752&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:npm/%40tootallnate/once@2.0.0&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2026-3449&#34;,&#xA;              &#34;source&#34; : &#34;osv-github&#34;,&#xA;              &#34;cvssScore&#34; : 3.3,&#xA;              &#34;severity&#34; : &#34;LOW&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-3449&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2026-3449&#34;,&#xA;              &#34;source&#34; : &#34;osv-github&#34;,&#xA;              &#34;cvssScore&#34; : 3.3,&#xA;              &#34;severity&#34; : &#34;LOW&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-3449&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          } ]&#xA;        },&#xA;        &#34;redhat-csaf&#34; : {&#xA;          &#34;summary&#34; : {&#xA;            &#34;direct&#34; : 582,&#xA;            &#34;transitive&#34; : 1173,&#xA;            &#34;total&#34; : 1755,&#xA;            &#34;dependencies&#34; : 209,&#xA;            &#34;critical&#34; : 53,&#xA;            &#34;high&#34; : 717,&#xA;            &#34;medium&#34; : 855,&#xA;            &#34;low&#34; : 130,&#xA;            &#34;remediations&#34; : 0,&#xA;            &#34;recommendations&#34; : 0,&#xA;            &#34;unscanned&#34; : 0&#xA;          },&#xA;          &#34;dependencies&#34; : [ {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;              &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.1,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=krb5-1.20.1-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39975&#34;,&#xA;                &#34;title&#34; : &#34;kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26462&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37370&#34;,&#xA;                &#34;title&#34; : &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37370&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-36054&#34;,&#xA;                &#34;title&#34; : &#34;lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-36054&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37371&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37371&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24528&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24528&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26458&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26461&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26461&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3576&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3576&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-devel@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-headers@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/kernel-headers@5.14.0-284.11.1.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=kernel-5.14.0-284.11.1.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-44466&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in net/ceph/messenger_v2.c in the Linux kernel before 6.4.5. There is an integer signedness error, leading to a buffer overflow and remote code execution via HELLO or one of the AUTH frames. This occurs because of an untrusted length taken from a TCP packet in ceph_decode_32.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5154&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5154&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21927&#34;,&#xA;                &#34;title&#34; : &#34;nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21927&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1652&#34;,&#xA;                &#34;title&#34; : &#34;A use-after-free flaw was found in nfsd4_ssc_setup_dul in fs/nfsd/nfs4proc.c in the NFS filesystem in the Linux Kernel. This issue could allow a local attacker to crash the system or it may lead to a kernel information leak problem.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1652&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-52922&#34;,&#xA;                &#34;title&#34; : &#34;can: bcm: Fix UAF in bcm_proc_show()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52922&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-36971&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-36971&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21756&#34;,&#xA;                &#34;title&#34; : &#34;vsock: Keep the binding until socket destruction&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21756&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22020&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22020&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38052&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38052&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38087&#34;,&#xA;                &#34;title&#34; : &#34;net/sched: fix use-after-free in taprio_dev_notifier&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38087&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-41723&#34;,&#xA;                &#34;title&#34; : &#34;Denial of service via crafted HTTP/2 stream in net/http and golang.org/x/net&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-41723&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38471&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38471&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-42284&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-42284&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-53104&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-53104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-37750&#34;,&#xA;                &#34;title&#34; : &#34;smb: client: fix UAF in decryption with multichannel&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-37750&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38250&#34;,&#xA;                &#34;title&#34; : &#34;Bluetooth: hci_core: Fix use-after-free in vhci_flush()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38250&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-49846&#34;,&#xA;                &#34;title&#34; : &#34;udf: Fix a slab-out-of-bounds write bug in udf_find_entry()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-49846&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-52933&#34;,&#xA;                &#34;title&#34; : &#34;Squashfs: fix handling and sanity checking of xattr_ids count&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52933&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-53751&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-53751&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6606&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6606&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6610&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6610&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-35937&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38538&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38538&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-53150&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-53150&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-57947&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-57947&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21887&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21887&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21893&#34;,&#xA;                &#34;title&#34; : &#34;keys: Fix UAF in key_put()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21893&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21920&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21969&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21969&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21979&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21979&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21993&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21993&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21997&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21997&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22026&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22026&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22055&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22055&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22104&#34;,&#xA;                &#34;title&#34; : &#34;ibmvnic: Use kernel helpers for hex dumps&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22113&#34;,&#xA;                &#34;title&#34; : &#34;ext4: avoid journaling sb update on error if journal is destroying&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22113&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22121&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22121&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-37738&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-37738&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-37799&#34;,&#xA;                &#34;title&#34; : &#34;vmxnet3: Fix malformed packet sizing in vmxnet3_process_xdp&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-37799&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38264&#34;,&#xA;                &#34;title&#34; : &#34;nvme-tcp: sanitize request list handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38264&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-49977&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-49977&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-50066&#34;,&#xA;                &#34;title&#34; : &#34;net: atlantic: fix aq_vec index out of range error&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-50066&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-53047&#34;,&#xA;                &#34;title&#34; : &#34;tee: amdtee: fix race condition in amdtee_open_session&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-53047&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-53107&#34;,&#xA;                &#34;title&#34; : &#34;veth: Fix use after free in XDP_REDIRECT&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-53107&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6932&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in Linux kernel&#39;s ipv4: igmp component&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6932&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0646&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0646&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-46858&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-46858&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50154&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50154&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-53141&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-53141&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21764&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21764&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21867&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21867&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21919&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21919&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21926&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21926&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21966&#34;,&#xA;                &#34;title&#34; : &#34;dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21966&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22004&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22004&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22126&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22126&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-37797&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-37797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-37803&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-37803&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-37890&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-37890&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-37914&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-37914&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-37943&#34;,&#xA;                &#34;title&#34; : &#34;wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-37943&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38079&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38079&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38086&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38086&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38124&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38124&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38177&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38177&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38200&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38200&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38332&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38332&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-50616&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-50616&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56614&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56614&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56615&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56615&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21883&#34;,&#xA;                &#34;title&#34; : &#34;ice: Fix deinitializing VF in error path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21883&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21928&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21928&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21929&#34;,&#xA;                &#34;title&#34; : &#34;HID: intel-ish-hid: Fix use-after-free issue in hid_ishtp_cl_remove()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21929&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21991&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21991&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22085&#34;,&#xA;                &#34;title&#34; : &#34;RDMA/core: Fix use-after-free when rename device name&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22085&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-47383&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-47383&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21759&#34;,&#xA;                &#34;title&#34; : &#34;ipv6: mcast: extend RCU protection in igmp6_send()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21759&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28746&#34;,&#xA;                &#34;title&#34; : &#34;Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28746&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6356&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6356&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6536&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6536&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-21823&#34;,&#xA;                &#34;title&#34; : &#34;Hardware logic with insecure de-synchronization in Intel(R) DSA and Intel(R) IAA for some Intel(R) 4th or 5th generation Xeon(R) processors may allow an authorized user to potentially enable escalation of privilege local access&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-21823&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21999&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21999&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38350&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38350&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-46695&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-46695&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50275&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50275&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-42292&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-42292&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50302&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50302&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-49395&#34;,&#xA;                &#34;title&#34; : &#34;um: Fix out-of-bounds read in LDT setup&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-49395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5090&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5090&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26664&#34;,&#xA;                &#34;title&#34; : &#34;hwmon: (coretemp) Fix out-of-bounds memory access&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26664&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50264&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50264&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38110&#34;,&#xA;                &#34;title&#34; : &#34;net/mdiobus: Fix potential out-of-bounds clause 45 read/write access&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38110&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-53122&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-53122&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-53197&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-53197&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-36941&#34;,&#xA;                &#34;title&#34; : &#34;wifi: nl80211: don&#39;t free NULL coalescing rule&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-36941&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38627&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38627&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-50042&#34;,&#xA;                &#34;title&#34; : &#34;net: genl: fix error path memory leak in policy dumping&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-50042&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1074&#34;,&#xA;                &#34;title&#34; : &#34;A memory leak flaw was found in the Linux kernel&#39;s Stream Control Transmission Protocol. This issue may occur when a user starts a malicious networking service and someone connects to this service. This could allow a local user to starve resources, causing a denial of service.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1074&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-45862&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in drivers/usb/storage/ene_ub6250.c for the ENE UB6250 reader driver in the Linux kernel before 6.2.5. An object could potentially extend beyond the end of an allocation.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-45862&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-52490&#34;,&#xA;                &#34;title&#34; : &#34;mm: migrate: fix getting incorrect page mapping during page migration&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-52658&#34;,&#xA;                &#34;title&#34; : &#34;Revert \&#34;net/mlx5: Block entering switchdev mode with ns inconsistency\&#34;&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52658&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-53597&#34;,&#xA;                &#34;title&#34; : &#34;cifs: fix mid leak during reconnection after timeout threshold&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-53597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-53704&#34;,&#xA;                &#34;title&#34; : &#34;clk: imx: clk-imx8mp: improve error handling in imx8mp_clocks_probe()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-53704&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-54004&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-54004&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-54093&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-54093&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-54271&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-54271&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-7192&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7192&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0443&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0443&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26615&#34;,&#xA;                &#34;title&#34; : &#34;net/smc: fix illegal rmb_desc access in SMC-D connection dump&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26615&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26878&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-27046&#34;,&#xA;                &#34;title&#34; : &#34;nfp: flower: handle acti_netdevs allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-27046&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-27052&#34;,&#xA;                &#34;title&#34; : &#34;wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-27052&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-35789&#34;,&#xA;                &#34;title&#34; : &#34;wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-35789&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-35852&#34;,&#xA;                &#34;title&#34; : &#34;mlxsw: spectrum_acl_tcam: Fix memory leak when canceling rehash work&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-35852&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-35890&#34;,&#xA;                &#34;title&#34; : &#34;gro: fix ownership transfer&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-35890&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-35907&#34;,&#xA;                &#34;title&#34; : &#34;mlxbf_gige: call request_irq() after NAPI initialized&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-35907&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-35952&#34;,&#xA;                &#34;title&#34; : &#34;drm/ast: Fix soft lockup&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-35952&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-35989&#34;,&#xA;                &#34;title&#34; : &#34;dmaengine: idxd: Fix oops during rmmod on single-CPU platforms&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-35989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-39483&#34;,&#xA;                &#34;title&#34; : &#34;KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright masked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-39483&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-40959&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40959&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-41035&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-41035&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-41064&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-41064&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-42079&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-42079&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-42272&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-42272&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-42283&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-42283&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-42322&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-42322&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-43854&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-43854&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-44990&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-44990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-44994&#34;,&#xA;                &#34;title&#34; : &#34;iommu: Restore lost return in iommu_report_device_fault()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-44994&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45018&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45018&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-46713&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-46713&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-46824&#34;,&#xA;                &#34;title&#34; : &#34;iommufd: Require drivers to supply the cache_invalidate_user ops&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-46824&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-49949&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-49949&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50208&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50208&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50251&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50251&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50252&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50252&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-53113&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-53113&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21669&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21669&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21962&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21962&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21963&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21963&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21964&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21964&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-37785&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-37785&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38234&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38234&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-52448&#34;,&#xA;                &#34;title&#34; : &#34;gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52448&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-53755&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-53755&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-47745&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-47745&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-53088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-53088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21961&#34;,&#xA;                &#34;title&#34; : &#34;eth: bnxt: fix truesize for mb-xdp-pass case&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22036&#34;,&#xA;                &#34;title&#34; : &#34;exfat: fix random stack corruption after get_block&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22036&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38417&#34;,&#xA;                &#34;title&#34; : &#34;ice: fix eswitch code memory leak in reset scenario&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38417&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-52771&#34;,&#xA;                &#34;title&#34; : &#34;cxl/port: Fix delete_endpoint() vs parent unregistration race&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52771&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-52864&#34;,&#xA;                &#34;title&#34; : &#34;platform/x86: wmi: Fix opening of char device&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52864&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26855&#34;,&#xA;                &#34;title&#34; : &#34;net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26855&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-35845&#34;,&#xA;                &#34;title&#34; : &#34;wifi: iwlwifi: dbg-tlv: ensure NUL termination&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-35845&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-36922&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-36922&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38555&#34;,&#xA;                &#34;title&#34; : &#34;net/mlx5: Discard command completions in internal error&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38555&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38556&#34;,&#xA;                &#34;title&#34; : &#34;net/mlx5: Add a timeout to acquire the command queue semaphore&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38556&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-43855&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-43855&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-46826&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-46826&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26897&#34;,&#xA;                &#34;title&#34; : &#34;wifi: ath9k: delay all of ath9k_wmi_event_tasklet() until init is complete&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26897&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38586&#34;,&#xA;                &#34;title&#34; : &#34;r8169: Fix possible ring buffer corruption on fragmented Tx packets.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38586&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-50846&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-50846&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-53639&#34;,&#xA;                &#34;title&#34; : &#34;wifi: ath6kl: reduce WARN to dev_dbg() in callback&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-53639&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-54153&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-54153&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-54267&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-54267&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-44466&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in net/ceph/messenger_v2.c in the Linux kernel before 6.4.5. There is an integer signedness error, leading to a buffer overflow and remote code execution via HELLO or one of the AUTH frames. This occurs because of an untrusted length taken from a TCP packet in ceph_decode_32.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=curl-7.76.1-23.el9_2.1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2398&#34;,&#xA;                &#34;title&#34; : &#34;HTTP/2 push headers memory-leak&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2398&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27536&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists libcurl &lt;8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27536&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28321&#34;,&#xA;                &#34;title&#34; : &#34;An improper certificate validation vulnerability exists in curl &lt;v8.1.0 in the way it supports matching of wildcard patterns when listed as \&#34;Subject Alternative Name\&#34; in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28321&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27538&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27538&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-46218&#34;,&#xA;                &#34;title&#34; : &#34;This flaw allows a malicious HTTP server to set \&#34;super cookies\&#34; in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl&#39;s function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-46218&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9086&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9086&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27533&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability in input validation exists in curl &lt;8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \&#34;telnet options\&#34; during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application&#39;s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27534&#34;,&#xA;                &#34;title&#34; : &#34;A path traversal vulnerability exists in curl &lt;8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27534&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28322&#34;,&#xA;                &#34;title&#34; : &#34;An information disclosure vulnerability exists in curl &lt;v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28322&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38546&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38546&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=nghttp2-1.43.0-5.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27135&#34;,&#xA;                &#34;title&#34; : &#34;nghttp2 Denial of service: Assertion failure due to the missing state validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27135&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28182&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28182&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=gmp-6.2.0-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/cpp@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libquadmath@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgomp@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=binutils-2.35.2-37.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2022-4285&#34;,&#xA;                &#34;title&#34; : &#34;An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a denial of service. This issue is the result of an incomplete fix for CVE-2020-16599.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-4285&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11082&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elf-eh-frame.c _bfd_elf_parse_eh_frame heap-based overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11082&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11083&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elfcode.h elf_swap_shdr heap-based overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11083&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5244&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils ld elflink.c elf_gc_sweep memory corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5244&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2022-4285&#34;,&#xA;                &#34;title&#34; : &#34;An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a denial of service. This issue is the result of an incomplete fix for CVE-2020-16599.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-4285&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/binutils@2.35.2-37.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=binutils-2.35.2-37.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2022-4285&#34;,&#xA;                &#34;title&#34; : &#34;An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a denial of service. This issue is the result of an incomplete fix for CVE-2020-16599.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-4285&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11081&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils objdump.c dump_dwarf_section out-of-bounds&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11081&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11082&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elf-eh-frame.c _bfd_elf_parse_eh_frame heap-based overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11082&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11083&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elfcode.h elf_swap_shdr heap-based overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11083&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11413&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elflink.c elf_link_add_object_symbols out-of-bounds&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11413&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5244&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils ld elflink.c elf_gc_sweep memory corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5244&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11412&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elflink.c bfd_elf_gc_record_vtentry out-of-bounds&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11412&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11414&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elflink.c get_link_hash_entry out-of-bounds&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11414&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11494&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elfxx-x86.c _bfd_x86_elf_late_size_sections out-of-bounds&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11494&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11495&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elf64-x86-64.c elf_x86_64_relocate_section heap-based overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11495&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11839&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils prdbg.c tg_tag_type return value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11839&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11840&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils ldmisc.c vfinfo out-of-bounds&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11840&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66861&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66862&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66862&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66863&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66863&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66864&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66864&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66866&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66866&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69647&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69647&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69648&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69648&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69649&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69649&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69650&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils thru 2.46 readelf contains a double free vulnerability when processing a crafted ELF binary with malformed relocation data. During GOT relocation handling, dump_relocations may return early without initializing the all_relocations array. As a result, process_got_section_contents() may pass an uninitialized r_symbol pointer to free(), leading to a double free and terminating the program with SIGABRT. No evidence of exploitable memory corruption or code execution was observed; the impact is limited to denial of service. NOTE: this is disputed by third parties because the observed behavior occurred only in pre-release code and did not affect any tagged version.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69652&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69652&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69645&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.8,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69645&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69646&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.8,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69646&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69651&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils thru 2.46 readelf contains a vulnerability that leads to an invalid pointer free when processing a crafted ELF binary with malformed relocation or symbol data. If dump_relocations returns early due to parsing errors, the internal all_relocations array may remain partially uninitialized. Later, process_got_section_contents() may attempt to free an invalid r_symbol pointer, triggering memory corruption checks in glibc and causing the program to terminate with SIGABRT. No evidence of further memory corruption or code execution was observed; the impact is limited to denial of service. NOTE: this is disputed by third parties because the observed behavior occurred only in pre-release code and did not affect any tagged version.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.8,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69651&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2022-4285&#34;,&#xA;                &#34;title&#34; : &#34;An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a denial of service. This issue is the result of an incomplete fix for CVE-2020-16599.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-4285&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libdnf-0.69.0-3.el9_2.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libxml2-2.9.13-3.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49794&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: heap use after free (uaf) leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49794&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49796&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: type confusion leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56171&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56171&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24928&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24928&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7425&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: libxml2: heap use-after-free in libxslt caused by atype corruption in xmlattrptr&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-25062&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-25062&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32415&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32415&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49795&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: null pointer dereference leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6021&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6021&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7424&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: type confusion in xmlnode.psvi between stylesheet and source nodes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7424&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39615&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39615&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6732&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via crafted xsd-validated document&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6732&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9714&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9714&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1757&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: memory leak leading to local denial of service in xmllint interactive shell&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-49043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-49043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28484&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28484&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-29469&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the &#39;\\0&#39; value).&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0990&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via uncontrolled recursion in xml catalog processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32414&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32414&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-26434&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2, there is a possible out of bounds read due to a buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-26434&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0989&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: unbounded relaxng include recursion leading to stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0992&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via crafted xml catalogs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.9,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0992&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6170&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: stack buffer overflow in xmllint interactive shell command handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6170&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=krb5-1.20.1-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39975&#34;,&#xA;                &#34;title&#34; : &#34;kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26462&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37370&#34;,&#xA;                &#34;title&#34; : &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37370&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-36054&#34;,&#xA;                &#34;title&#34; : &#34;lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-36054&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37371&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37371&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24528&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24528&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26458&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26461&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26461&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3576&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3576&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-setuptools-53.0.0-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-47273&#34;,&#xA;                &#34;title&#34; : &#34;setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-47273&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5713&#34;,&#xA;                &#34;title&#34; : &#34;Out-of-bounds read/write during remote profiling and asyncio process introspection when connecting to malicious target&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5713&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13837&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13837&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4224&#34;,&#xA;                &#34;title&#34; : &#34;Stack overflow parsing XML with deeply nested DTD content models&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4224&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3644&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete control character validation in http.cookies&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3644&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12781&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12781&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3446&#34;,&#xA;                &#34;title&#34; : &#34;Base64 decoding stops at first padded quad by default&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15282&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15282&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1502&#34;,&#xA;                &#34;title&#34; : &#34;HTTP client proxy tunnel headers not validated for CR/LF&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1502&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2297&#34;,&#xA;                &#34;title&#34; : &#34;SourcelessFileLoader does not use io.open_code()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2297&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3479&#34;,&#xA;                &#34;title&#34; : &#34;pkgutil.get_data() does not enforce documented restrictions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3479&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13462&#34;,&#xA;                &#34;title&#34; : &#34;tarfile: Skip DIRTYPE normalization during GNU LONGNAME/LONGLINK handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gnupg2-2.3.3-2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-24882&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-24882&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68973&#34;,&#xA;                &#34;title&#34; : &#34;In GnuPG before 2.4.9, armor_filter in g10/armor.c has two increments of an index variable where one is intended, leading to an out-of-bounds write for crafted input. (For ExtendedLTS, 2.2.51 and later are fixed versions.)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68973&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68972&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68972&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-24882&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-24882&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=curl-7.76.1-23.el9_2.1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2398&#34;,&#xA;                &#34;title&#34; : &#34;HTTP/2 push headers memory-leak&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2398&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27536&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists libcurl &lt;8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27536&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28321&#34;,&#xA;                &#34;title&#34; : &#34;An improper certificate validation vulnerability exists in curl &lt;v8.1.0 in the way it supports matching of wildcard patterns when listed as \&#34;Subject Alternative Name\&#34; in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28321&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27538&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27538&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-46218&#34;,&#xA;                &#34;title&#34; : &#34;This flaw allows a malicious HTTP server to set \&#34;super cookies\&#34; in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl&#39;s function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-46218&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9086&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9086&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27533&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability in input validation exists in curl &lt;8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \&#34;telnet options\&#34; during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application&#39;s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27534&#34;,&#xA;                &#34;title&#34; : &#34;A path traversal vulnerability exists in curl &lt;8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27534&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28322&#34;,&#xA;                &#34;title&#34; : &#34;An information disclosure vulnerability exists in curl &lt;v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28322&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38546&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38546&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=curl-7.76.1-23.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2398&#34;,&#xA;                &#34;title&#34; : &#34;HTTP/2 push headers memory-leak&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2398&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27535&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl &lt;8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27536&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists libcurl &lt;8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27536&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28321&#34;,&#xA;                &#34;title&#34; : &#34;An improper certificate validation vulnerability exists in curl &lt;v8.1.0 in the way it supports matching of wildcard patterns when listed as \&#34;Subject Alternative Name\&#34; in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28321&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27538&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27538&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-46218&#34;,&#xA;                &#34;title&#34; : &#34;This flaw allows a malicious HTTP server to set \&#34;super cookies\&#34; in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl&#39;s function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-46218&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9086&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9086&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27533&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability in input validation exists in curl &lt;8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \&#34;telnet options\&#34; during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application&#39;s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27534&#34;,&#xA;                &#34;title&#34; : &#34;A path traversal vulnerability exists in curl &lt;8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27534&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28322&#34;,&#xA;                &#34;title&#34; : &#34;An information disclosure vulnerability exists in curl &lt;v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28322&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38546&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38546&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libarchive-3.5.3-4.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-5914&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5914&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4111&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: infinite loop denial of service in rar5 decompression via archive_read_data() in libarchive&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4111&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4424&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: libarchive: information disclosure via heap out-of-bounds read in rar archive processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4424&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5121&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: libarchive: arbitrary code execution via integer overflow in iso9660 image processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5121&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-60753&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-60753&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-57970&#34;,&#xA;                &#34;title&#34; : &#34;libarchive through 3.7.7 has a heap-based buffer over-read in header_gnu_longlink in archive_read_support_format_tar.c via a TAR archive because it mishandles truncation in the middle of a GNU long linkname.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-57970&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-25724&#34;,&#xA;                &#34;title&#34; : &#34;list_item_verbose in tar/util.c in libarchive through 3.7.7 does not check an strftime return value, which can lead to a denial of service or unspecified other impact via a crafted TAR archive that is read with a verbose value of 2. For example, the 100-byte buffer may not be sufficient for a custom locale.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-25724&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-5914&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5914&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=sqlite-3.34.1-6.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-7104&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3277&#34;,&#xA;                &#34;title&#34; : &#34;An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3277&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glib2-2.68.4-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13601&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in in g_escape_uri_string()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-52533&#34;,&#xA;                &#34;title&#34; : &#34;gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing &#39;\\0&#39; character.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-52533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32611&#34;,&#xA;                &#34;title&#34; : &#34;G_variant_byteswap() can take a long time with some non-normal inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32611&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32665&#34;,&#xA;                &#34;title&#34; : &#34;Gvariant deserialisation does not match spec for non-normal data&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32665&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14512&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in glib gio attribute escaping causes heap buffer overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14512&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-29499&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29499&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14087&#34;,&#xA;                &#34;title&#34; : &#34;Glib: glib: buffer underflow in gvariant parser leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14087&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4373&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4373&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-34397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.8,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-34397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7039&#34;,&#xA;                &#34;title&#34; : &#34;Glib: buffer under-read on glib through glib/gfileutils.c via get_tmp_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7039&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0988&#34;,&#xA;                &#34;title&#34; : &#34;Glib: glib: denial of service via integer overflow in g_buffered_input_stream_peek()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0988&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13601&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in in g_escape_uri_string()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gnutls-3.7.6-20.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-0553&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: incomplete fix for cve-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0553&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0567&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0567&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32988&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls othername san export&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32988&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32990&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls certtool template parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6395&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: null pointer dereference in _gnutls_figure_common_ciphersuite()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5981&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12243&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: gnutls impacted by inefficient der decoding in libtasn1 leading to remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12243&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28834&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28834&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14831&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: gnutls: denial of service via excessive resource consumption during certificate verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14831&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32989&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls sct extension parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28835&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28835&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9820&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: stack-based buffer overflow in gnutls_pkcs11_token_init() function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9820&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-0553&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: incomplete fix for cve-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0553&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libgcrypt-1.10.0-10.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2236&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2236&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41990&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 mishandles Dilithium signing. Writes to a static array lack a bounds check but do not use attacker-controlled data.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=expat-2.5.0-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28757&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45490&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8176&#34;,&#xA;                &#34;title&#34; : &#34;Libexpat: expat: improper restriction of xml entity expansion depth in libexpat&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45492&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45492&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50602&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59375&#34;,&#xA;                &#34;title&#34; : &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59375&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41080&#34;,&#xA;                &#34;title&#34; : &#34;libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41080&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=nghttp2-1.43.0-5.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27135&#34;,&#xA;                &#34;title&#34; : &#34;nghttp2 Denial of service: Assertion failure due to the missing state validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27135&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28182&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28182&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=openldap-2.6.2-3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openldap@2.6.2-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=openldap-2.6.2-3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/rpm@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=gmp-6.2.0-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27456&#34;,&#xA;                &#34;title&#34; : &#34;util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27456&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3184&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: access control bypass due to improper hostname canonicalization&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3184&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libsmartcols@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-pip-21.2.3-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/file-libs@5.39-12.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=file-5.39-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2022-48554&#34;,&#xA;                &#34;title&#34; : &#34;File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: \&#34;File\&#34; is the name of an Open Source project.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-48554&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2022-48554&#34;,&#xA;                &#34;title&#34; : &#34;File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: \&#34;File\&#34; is the name of an Open Source project.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-48554&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=cmake-3.20.2-8.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libxml2-2.9.13-3.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49794&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: heap use after free (uaf) leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49794&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49796&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: type confusion leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56171&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56171&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24928&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24928&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7425&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: libxml2: heap use-after-free in libxslt caused by atype corruption in xmlattrptr&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-25062&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-25062&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32415&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32415&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49795&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: null pointer dereference leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6021&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6021&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7424&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: type confusion in xmlnode.psvi between stylesheet and source nodes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7424&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39615&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39615&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6732&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via crafted xsd-validated document&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6732&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9714&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9714&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1757&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: memory leak leading to local denial of service in xmllint interactive shell&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-49043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-49043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28484&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28484&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-29469&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the &#39;\\0&#39; value).&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0990&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via uncontrolled recursion in xml catalog processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32414&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32414&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-26434&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2, there is a possible out of bounds read due to a buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-26434&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0989&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: unbounded relaxng include recursion leading to stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0992&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via crafted xml catalogs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.9,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0992&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6170&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: stack buffer overflow in xmllint interactive shell command handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6170&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=krb5-1.20.1-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39975&#34;,&#xA;                &#34;title&#34; : &#34;kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26462&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37370&#34;,&#xA;                &#34;title&#34; : &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37370&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-36054&#34;,&#xA;                &#34;title&#34; : &#34;lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-36054&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37371&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37371&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24528&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24528&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26458&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26461&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26461&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3576&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3576&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/emacs-filesystem@27.2-8.el9_2.1?arch=noarch&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=emacs-27.2-8.el9_2.1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-1244&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-1244&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-30205&#34;,&#xA;                &#34;title&#34; : &#34;In Emacs before 29.3, Org mode considers contents of remote files to be trusted. This affects Org Mode before 9.6.23.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-30205&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-39331&#34;,&#xA;                &#34;title&#34; : &#34;In Emacs before 29.4, org-link-expand-abbrev in lisp/ol.el expands a %(...) link abbrev even when it specifies an unsafe function, such as shell-command-to-string. This affects Org Mode before 9.7.5.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-39331&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-53920&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-53920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-30203&#34;,&#xA;                &#34;title&#34; : &#34;In Emacs before 29.3, Gnus treats inline MIME contents as trusted.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-30203&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-30204&#34;,&#xA;                &#34;title&#34; : &#34;In Emacs before 29.3, LaTeX preview is enabled by default for e-mail attachments.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-30204&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-1244&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-1244&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-setuptools-53.0.0-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-47273&#34;,&#xA;                &#34;title&#34; : &#34;setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-47273&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5713&#34;,&#xA;                &#34;title&#34; : &#34;Out-of-bounds read/write during remote profiling and asyncio process introspection when connecting to malicious target&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5713&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13837&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13837&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4224&#34;,&#xA;                &#34;title&#34; : &#34;Stack overflow parsing XML with deeply nested DTD content models&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4224&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3644&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete control character validation in http.cookies&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3644&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12781&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12781&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3446&#34;,&#xA;                &#34;title&#34; : &#34;Base64 decoding stops at first padded quad by default&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15282&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15282&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1502&#34;,&#xA;                &#34;title&#34; : &#34;HTTP client proxy tunnel headers not validated for CR/LF&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1502&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2297&#34;,&#xA;                &#34;title&#34; : &#34;SourcelessFileLoader does not use io.open_code()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2297&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3479&#34;,&#xA;                &#34;title&#34; : &#34;pkgutil.get_data() does not enforce documented restrictions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3479&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13462&#34;,&#xA;                &#34;title&#34; : &#34;tarfile: Skip DIRTYPE normalization during GNU LONGNAME/LONGLINK handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/vim-filesystem@8.2.2637-20.el9_1?arch=noarch&amp;distro=rhel-9.2&amp;epoch=2&amp;upstream=vim-8.2.2637-20.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-34982&#34;,&#xA;                &#34;title&#34; : &#34;Vim modeline bypass via various options affects Vim &lt; 9.2.0276&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.2,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-34982&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-25749&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-25749&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-33412&#34;,&#xA;                &#34;title&#34; : &#34;Vim affected by Command injection via newline in glob()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-33412&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4752&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4752&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-3903&#34;,&#xA;                &#34;title&#34; : &#34;Heap-based Buffer Overflow in vim/vim&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-3903&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28417&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28417&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-53905&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-53905&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-53906&#34;,&#xA;                &#34;title&#34; : &#34;Vim has path traversal issue with zip.vim and special crafted zip archives&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-53906&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-34982&#34;,&#xA;                &#34;title&#34; : &#34;Vim modeline bypass via various options affects Vim &lt; 9.2.0276&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.2,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-34982&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=curl-7.76.1-23.el9_2.1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2398&#34;,&#xA;                &#34;title&#34; : &#34;HTTP/2 push headers memory-leak&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2398&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27536&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists libcurl &lt;8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27536&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28321&#34;,&#xA;                &#34;title&#34; : &#34;An improper certificate validation vulnerability exists in curl &lt;v8.1.0 in the way it supports matching of wildcard patterns when listed as \&#34;Subject Alternative Name\&#34; in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28321&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27538&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27538&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-46218&#34;,&#xA;                &#34;title&#34; : &#34;This flaw allows a malicious HTTP server to set \&#34;super cookies\&#34; in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl&#39;s function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-46218&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9086&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9086&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27533&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability in input validation exists in curl &lt;8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \&#34;telnet options\&#34; during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application&#39;s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27534&#34;,&#xA;                &#34;title&#34; : &#34;A path traversal vulnerability exists in curl &lt;8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27534&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28322&#34;,&#xA;                &#34;title&#34; : &#34;An information disclosure vulnerability exists in curl &lt;v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28322&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38546&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38546&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=curl-7.76.1-23.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2398&#34;,&#xA;                &#34;title&#34; : &#34;HTTP/2 push headers memory-leak&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2398&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27535&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl &lt;8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27536&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists libcurl &lt;8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27536&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28321&#34;,&#xA;                &#34;title&#34; : &#34;An improper certificate validation vulnerability exists in curl &lt;v8.1.0 in the way it supports matching of wildcard patterns when listed as \&#34;Subject Alternative Name\&#34; in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28321&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27538&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27538&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-46218&#34;,&#xA;                &#34;title&#34; : &#34;This flaw allows a malicious HTTP server to set \&#34;super cookies\&#34; in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl&#39;s function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-46218&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9086&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9086&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27533&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability in input validation exists in curl &lt;8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \&#34;telnet options\&#34; during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application&#39;s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27534&#34;,&#xA;                &#34;title&#34; : &#34;A path traversal vulnerability exists in curl &lt;8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27534&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28322&#34;,&#xA;                &#34;title&#34; : &#34;An information disclosure vulnerability exists in curl &lt;v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28322&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38546&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38546&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libarchive-3.5.3-4.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-5914&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5914&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4111&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: infinite loop denial of service in rar5 decompression via archive_read_data() in libarchive&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4111&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4424&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: libarchive: information disclosure via heap out-of-bounds read in rar archive processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4424&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5121&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: libarchive: arbitrary code execution via integer overflow in iso9660 image processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5121&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-60753&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-60753&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-57970&#34;,&#xA;                &#34;title&#34; : &#34;libarchive through 3.7.7 has a heap-based buffer over-read in header_gnu_longlink in archive_read_support_format_tar.c via a TAR archive because it mishandles truncation in the middle of a GNU long linkname.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-57970&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-25724&#34;,&#xA;                &#34;title&#34; : &#34;list_item_verbose in tar/util.c in libarchive through 3.7.7 does not check an strftime return value, which can lead to a denial of service or unspecified other impact via a crafted TAR archive that is read with a verbose value of 2. For example, the 100-byte buffer may not be sufficient for a custom locale.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-25724&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-5914&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5914&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=sqlite-3.34.1-6.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-7104&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3277&#34;,&#xA;                &#34;title&#34; : &#34;An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3277&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=nghttp2-1.43.0-5.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27135&#34;,&#xA;                &#34;title&#34; : &#34;nghttp2 Denial of service: Assertion failure due to the missing state validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27135&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28182&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28182&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=expat-2.5.0-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28757&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45490&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8176&#34;,&#xA;                &#34;title&#34; : &#34;Libexpat: expat: improper restriction of xml entity expansion depth in libexpat&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45492&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45492&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50602&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59375&#34;,&#xA;                &#34;title&#34; : &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59375&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41080&#34;,&#xA;                &#34;title&#34; : &#34;libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41080&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuv@1.42.0-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=libuv-1.42.0-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-24806&#34;,&#xA;                &#34;title&#34; : &#34;Improper Domain Lookup that potentially leads to SSRF attacks in libuv&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-24806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-24806&#34;,&#xA;                &#34;title&#34; : &#34;Improper Domain Lookup that potentially leads to SSRF attacks in libuv&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-24806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/rpm@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=gmp-6.2.0-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-pip-21.2.3-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch&amp;distro=rhel-9.2&amp;upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libxml2-2.9.13-3.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49794&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: heap use after free (uaf) leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49794&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49796&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: type confusion leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56171&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56171&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24928&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24928&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7425&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: libxml2: heap use-after-free in libxslt caused by atype corruption in xmlattrptr&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-25062&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-25062&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32415&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32415&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49795&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: null pointer dereference leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6021&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6021&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7424&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: type confusion in xmlnode.psvi between stylesheet and source nodes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7424&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39615&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39615&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6732&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via crafted xsd-validated document&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6732&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9714&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9714&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1757&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: memory leak leading to local denial of service in xmllint interactive shell&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-49043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-49043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28484&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28484&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-29469&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the &#39;\\0&#39; value).&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0990&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via uncontrolled recursion in xml catalog processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32414&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32414&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-26434&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2, there is a possible out of bounds read due to a buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-26434&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0989&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: unbounded relaxng include recursion leading to stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0992&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via crafted xml catalogs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.9,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0992&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6170&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: stack buffer overflow in xmllint interactive shell command handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6170&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=krb5-1.20.1-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39975&#34;,&#xA;                &#34;title&#34; : &#34;kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26462&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37370&#34;,&#xA;                &#34;title&#34; : &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37370&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-36054&#34;,&#xA;                &#34;title&#34; : &#34;lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-36054&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37371&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37371&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24528&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24528&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26458&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26461&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26461&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3576&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3576&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-setuptools-53.0.0-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-47273&#34;,&#xA;                &#34;title&#34; : &#34;setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-47273&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5713&#34;,&#xA;                &#34;title&#34; : &#34;Out-of-bounds read/write during remote profiling and asyncio process introspection when connecting to malicious target&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5713&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13837&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13837&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4224&#34;,&#xA;                &#34;title&#34; : &#34;Stack overflow parsing XML with deeply nested DTD content models&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4224&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3644&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete control character validation in http.cookies&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3644&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12781&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12781&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3446&#34;,&#xA;                &#34;title&#34; : &#34;Base64 decoding stops at first padded quad by default&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15282&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15282&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1502&#34;,&#xA;                &#34;title&#34; : &#34;HTTP client proxy tunnel headers not validated for CR/LF&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1502&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2297&#34;,&#xA;                &#34;title&#34; : &#34;SourcelessFileLoader does not use io.open_code()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2297&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3479&#34;,&#xA;                &#34;title&#34; : &#34;pkgutil.get_data() does not enforce documented restrictions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3479&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13462&#34;,&#xA;                &#34;title&#34; : &#34;tarfile: Skip DIRTYPE normalization during GNU LONGNAME/LONGLINK handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcomps@0.1.18-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcomps-0.1.18-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-1312&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1312&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0980&#34;,&#xA;                &#34;title&#34; : &#34;Rubyipmi: red hat satellite: remote code execution in rubyipmi via malicious bmc username&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0980&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1207&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1207&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1530&#34;,&#xA;                &#34;title&#34; : &#34;Fog-kubevirt: fog-kubevirt: man-in-the-middle vulnerability due to disabled certificate validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1530&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1531&#34;,&#xA;                &#34;title&#34; : &#34;Foreman-kubevirt: foreman_kubevirt: man-in-the-middle due to insecure default ssl verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1531&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1961&#34;,&#xA;                &#34;title&#34; : &#34;Forman: foreman: remote code execution via command injection in websocket proxy&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-46877&#34;,&#xA;                &#34;title&#34; : &#34;jackson-databind 2.10.x through 2.12.x before 2.12.6 and 2.13.x before 2.13.1 allows attackers to cause a denial of service (2 GB transient heap usage per read) in uncommon situations involving JsonNode JDK serialization.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-46877&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14550&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14550&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6176&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1285&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1285&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68121&#34;,&#xA;                &#34;title&#34; : &#34;Unexpected session resumption in crypto/tls&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68121&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28863&#34;,&#xA;                &#34;title&#34; : &#34;node-tar vulnerable to denial of service while parsing a tar file due to lack of folders count validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28863&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4324&#34;,&#xA;                &#34;title&#34; : &#34;Rubygem-katello: katello: denial of service and potential information disclosure via sql injection&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4324&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-1312&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1312&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-libcomps@0.1.18-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcomps-0.1.18-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-1312&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1312&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0980&#34;,&#xA;                &#34;title&#34; : &#34;Rubyipmi: red hat satellite: remote code execution in rubyipmi via malicious bmc username&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0980&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1207&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1207&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1530&#34;,&#xA;                &#34;title&#34; : &#34;Fog-kubevirt: fog-kubevirt: man-in-the-middle vulnerability due to disabled certificate validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1530&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1531&#34;,&#xA;                &#34;title&#34; : &#34;Foreman-kubevirt: foreman_kubevirt: man-in-the-middle due to insecure default ssl verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1531&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1961&#34;,&#xA;                &#34;title&#34; : &#34;Forman: foreman: remote code execution via command injection in websocket proxy&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-46877&#34;,&#xA;                &#34;title&#34; : &#34;jackson-databind 2.10.x through 2.12.x before 2.12.6 and 2.13.x before 2.13.1 allows attackers to cause a denial of service (2 GB transient heap usage per read) in uncommon situations involving JsonNode JDK serialization.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-46877&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14550&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14550&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6176&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1285&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1285&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68121&#34;,&#xA;                &#34;title&#34; : &#34;Unexpected session resumption in crypto/tls&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68121&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28863&#34;,&#xA;                &#34;title&#34; : &#34;node-tar vulnerable to denial of service while parsing a tar file due to lack of folders count validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28863&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4324&#34;,&#xA;                &#34;title&#34; : &#34;Rubygem-katello: katello: denial of service and potential information disclosure via sql injection&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4324&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-1312&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1312&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gnupg2-2.3.3-2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-24882&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-24882&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68973&#34;,&#xA;                &#34;title&#34; : &#34;In GnuPG before 2.4.9, armor_filter in g10/armor.c has two increments of an index variable where one is intended, leading to an out-of-bounds write for crafted input. (For ExtendedLTS, 2.2.51 and later are fixed versions.)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68973&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68972&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68972&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-24882&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-24882&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=curl-7.76.1-23.el9_2.1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2398&#34;,&#xA;                &#34;title&#34; : &#34;HTTP/2 push headers memory-leak&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2398&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27536&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists libcurl &lt;8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27536&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28321&#34;,&#xA;                &#34;title&#34; : &#34;An improper certificate validation vulnerability exists in curl &lt;v8.1.0 in the way it supports matching of wildcard patterns when listed as \&#34;Subject Alternative Name\&#34; in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28321&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27538&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27538&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-46218&#34;,&#xA;                &#34;title&#34; : &#34;This flaw allows a malicious HTTP server to set \&#34;super cookies\&#34; in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl&#39;s function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-46218&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9086&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9086&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27533&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability in input validation exists in curl &lt;8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \&#34;telnet options\&#34; during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application&#39;s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27534&#34;,&#xA;                &#34;title&#34; : &#34;A path traversal vulnerability exists in curl &lt;8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27534&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28322&#34;,&#xA;                &#34;title&#34; : &#34;An information disclosure vulnerability exists in curl &lt;v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28322&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38546&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38546&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=curl-7.76.1-23.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2398&#34;,&#xA;                &#34;title&#34; : &#34;HTTP/2 push headers memory-leak&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2398&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27535&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl &lt;8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27536&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists libcurl &lt;8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27536&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28321&#34;,&#xA;                &#34;title&#34; : &#34;An improper certificate validation vulnerability exists in curl &lt;v8.1.0 in the way it supports matching of wildcard patterns when listed as \&#34;Subject Alternative Name\&#34; in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28321&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27538&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27538&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-46218&#34;,&#xA;                &#34;title&#34; : &#34;This flaw allows a malicious HTTP server to set \&#34;super cookies\&#34; in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl&#39;s function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-46218&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9086&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9086&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27533&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability in input validation exists in curl &lt;8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \&#34;telnet options\&#34; during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application&#39;s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27534&#34;,&#xA;                &#34;title&#34; : &#34;A path traversal vulnerability exists in curl &lt;8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27534&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28322&#34;,&#xA;                &#34;title&#34; : &#34;An information disclosure vulnerability exists in curl &lt;v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28322&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38546&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38546&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libarchive-3.5.3-4.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-5914&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5914&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4111&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: infinite loop denial of service in rar5 decompression via archive_read_data() in libarchive&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4111&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4424&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: libarchive: information disclosure via heap out-of-bounds read in rar archive processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4424&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5121&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: libarchive: arbitrary code execution via integer overflow in iso9660 image processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5121&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-60753&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-60753&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-57970&#34;,&#xA;                &#34;title&#34; : &#34;libarchive through 3.7.7 has a heap-based buffer over-read in header_gnu_longlink in archive_read_support_format_tar.c via a TAR archive because it mishandles truncation in the middle of a GNU long linkname.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-57970&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-25724&#34;,&#xA;                &#34;title&#34; : &#34;list_item_verbose in tar/util.c in libarchive through 3.7.7 does not check an strftime return value, which can lead to a denial of service or unspecified other impact via a crafted TAR archive that is read with a verbose value of 2. For example, the 100-byte buffer may not be sufficient for a custom locale.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-25724&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-5914&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5914&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glib2-2.68.4-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13601&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in in g_escape_uri_string()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-52533&#34;,&#xA;                &#34;title&#34; : &#34;gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing &#39;\\0&#39; character.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-52533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32611&#34;,&#xA;                &#34;title&#34; : &#34;G_variant_byteswap() can take a long time with some non-normal inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32611&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32665&#34;,&#xA;                &#34;title&#34; : &#34;Gvariant deserialisation does not match spec for non-normal data&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32665&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14512&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in glib gio attribute escaping causes heap buffer overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14512&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-29499&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29499&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14087&#34;,&#xA;                &#34;title&#34; : &#34;Glib: glib: buffer underflow in gvariant parser leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14087&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4373&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4373&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-34397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.8,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-34397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7039&#34;,&#xA;                &#34;title&#34; : &#34;Glib: buffer under-read on glib through glib/gfileutils.c via get_tmp_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7039&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0988&#34;,&#xA;                &#34;title&#34; : &#34;Glib: glib: denial of service via integer overflow in g_buffered_input_stream_peek()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0988&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13601&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in in g_escape_uri_string()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=sqlite-3.34.1-6.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-7104&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3277&#34;,&#xA;                &#34;title&#34; : &#34;An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3277&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=expat-2.5.0-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28757&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45490&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8176&#34;,&#xA;                &#34;title&#34; : &#34;Libexpat: expat: improper restriction of xml entity expansion depth in libexpat&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45492&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45492&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50602&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59375&#34;,&#xA;                &#34;title&#34; : &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59375&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41080&#34;,&#xA;                &#34;title&#34; : &#34;libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41080&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=nghttp2-1.43.0-5.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27135&#34;,&#xA;                &#34;title&#34; : &#34;nghttp2 Denial of service: Assertion failure due to the missing state validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27135&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28182&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28182&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gnutls-3.7.6-20.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-0553&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: incomplete fix for cve-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0553&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0567&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0567&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32988&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls othername san export&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32988&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32990&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls certtool template parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6395&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: null pointer dereference in _gnutls_figure_common_ciphersuite()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5981&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12243&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: gnutls impacted by inefficient der decoding in libtasn1 leading to remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12243&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28834&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28834&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14831&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: gnutls: denial of service via excessive resource consumption during certificate verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14831&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32989&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls sct extension parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28835&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28835&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9820&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: stack-based buffer overflow in gnutls_pkcs11_token_init() function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9820&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-0553&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: incomplete fix for cve-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0553&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libgcrypt-1.10.0-10.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2236&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2236&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41990&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 mishandles Dilithium signing. Writes to a static array lack a bounds check but do not use attacker-controlled data.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=openldap-2.6.2-3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openldap@2.6.2-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=openldap-2.6.2-3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/rpm-sign-libs@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/rpm-build-libs@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-rpm@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/rpm@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/tpm2-tss@3.0.3-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=tpm2-tss-3.0.3-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-22745&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-22745&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-22745&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-22745&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/dbus-libs@1.12.20-7.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=dbus-1.12.20-7.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-34969&#34;,&#xA;                &#34;title&#34; : &#34;D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-34969&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-34969&#34;,&#xA;                &#34;title&#34; : &#34;D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-34969&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=gmp-6.2.0-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libsmartcols@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27456&#34;,&#xA;                &#34;title&#34; : &#34;util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27456&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3184&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: access control bypass due to improper hostname canonicalization&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3184&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgomp@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/systemd-libs@252-13.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=systemd-252-13.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4598&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4598&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-pip-21.2.3-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/file-libs@5.39-12.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=file-5.39-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2022-48554&#34;,&#xA;                &#34;title&#34; : &#34;File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: \&#34;File\&#34; is the name of an Open Source project.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-48554&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2022-48554&#34;,&#xA;                &#34;title&#34; : &#34;File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: \&#34;File\&#34; is the name of an Open Source project.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-48554&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=2&amp;upstream=shadow-utils-4.9-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-4641&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4641&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56433&#34;,&#xA;                &#34;title&#34; : &#34;shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.6,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56433&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-4641&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4641&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/dbus-libs@1.12.20-7.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=dbus-1.12.20-7.el9_1.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2023-34969&#34;,&#xA;              &#34;title&#34; : &#34;D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.2,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-34969&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libgcrypt-1.10.0-10.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2236&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2236&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41990&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 mishandles Dilithium signing. Writes to a static array lack a bounds check but do not use attacker-controlled data.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/systemd-libs@252-13.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=systemd-252-13.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4598&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4598&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=usermode-1.114-4.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28390&#34;,&#xA;                &#34;title&#34; : &#34;Possible NULL Dereference When Processing CMS KeyTransportRecipientInfo&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28390&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9231&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9231&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28388&#34;,&#xA;                &#34;title&#34; : &#34;NULL Pointer Dereference When Processing a Delta CRL&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28388&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28389&#34;,&#xA;                &#34;title&#34; : &#34;Possible NULL Dereference When Processing CMS KeyAgreeRecipientInfo&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28389&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-31790&#34;,&#xA;                &#34;title&#34; : &#34;Incorrect Failure Handling in RSA KEM RSASVE Encapsulation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-31790&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-31789&#34;,&#xA;                &#34;title&#34; : &#34;Heap Buffer Overflow in Hexadecimal Conversion&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-31789&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28386&#34;,&#xA;                &#34;title&#34; : &#34;Out-of-bounds Read in AES-CFB-128 on X86-64 with AVX-512 Support&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28386&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28387&#34;,&#xA;                &#34;title&#34; : &#34;Potential Use-after-free in DANE Client Code&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28387&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.1,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2673&#34;,&#xA;                &#34;title&#34; : &#34;OpenSSL TLS 1.3 server may choose unexpected key agreement group&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.1,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2673&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=krb5-1.20.1-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39975&#34;,&#xA;                &#34;title&#34; : &#34;kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26462&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37370&#34;,&#xA;                &#34;title&#34; : &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37370&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-36054&#34;,&#xA;                &#34;title&#34; : &#34;lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-36054&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37371&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37371&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24528&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24528&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26458&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26461&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26461&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3576&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3576&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/pam@1.5.1-14.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=pam-1.5.1-14.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6020&#34;,&#xA;                &#34;title&#34; : &#34;Linux-pam: linux-pam directory traversal&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6020&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8941&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8941&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-10963&#34;,&#xA;                &#34;title&#34; : &#34;Pam: improper hostname interpretation in pam_access leads to access control bypass&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-10963&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-22365&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-22365&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-10041&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-10041&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6020&#34;,&#xA;                &#34;title&#34; : &#34;Linux-pam: linux-pam directory traversal&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6020&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glib2-2.68.4-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13601&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in in g_escape_uri_string()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-52533&#34;,&#xA;                &#34;title&#34; : &#34;gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing &#39;\\0&#39; character.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-52533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32611&#34;,&#xA;                &#34;title&#34; : &#34;G_variant_byteswap() can take a long time with some non-normal inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32611&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32665&#34;,&#xA;                &#34;title&#34; : &#34;Gvariant deserialisation does not match spec for non-normal data&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32665&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14512&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in glib gio attribute escaping causes heap buffer overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14512&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-29499&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29499&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14087&#34;,&#xA;                &#34;title&#34; : &#34;Glib: glib: buffer underflow in gvariant parser leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14087&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4373&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4373&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-34397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.8,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-34397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7039&#34;,&#xA;                &#34;title&#34; : &#34;Glib: buffer under-read on glib through glib/gfileutils.c via get_tmp_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7039&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0988&#34;,&#xA;                &#34;title&#34; : &#34;Glib: glib: denial of service via integer overflow in g_buffered_input_stream_peek()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0988&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13601&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in in g_escape_uri_string()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gnutls-3.7.6-20.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-0553&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: incomplete fix for cve-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0553&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0567&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0567&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32988&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls othername san export&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32988&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32990&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls certtool template parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6395&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: null pointer dereference in _gnutls_figure_common_ciphersuite()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5981&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12243&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: gnutls impacted by inefficient der decoding in libtasn1 leading to remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12243&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28834&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28834&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14831&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: gnutls: denial of service via excessive resource consumption during certificate verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14831&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32989&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls sct extension parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28835&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28835&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9820&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: stack-based buffer overflow in gnutls_pkcs11_token_init() function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9820&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-0553&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: incomplete fix for cve-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0553&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libgcrypt-1.10.0-10.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2236&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2236&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41990&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 mishandles Dilithium signing. Writes to a static array lack a bounds check but do not use attacker-controlled data.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openldap@2.6.2-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=openldap-2.6.2-3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libeconf@0.4.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libeconf-0.4.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-22652&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in \&#34;read_file\&#34; function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-22652&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-22652&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in \&#34;read_file\&#34; function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-22652&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=gmp-6.2.0-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27456&#34;,&#xA;                &#34;title&#34; : &#34;util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27456&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3184&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: access control bypass due to improper hostname canonicalization&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3184&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libsmartcols@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/util-linux@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27456&#34;,&#xA;                &#34;title&#34; : &#34;util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27456&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3184&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: access control bypass due to improper hostname canonicalization&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3184&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libfdisk@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/util-linux-core@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/systemd-libs@252-13.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=systemd-252-13.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4598&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4598&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=2&amp;upstream=shadow-utils-4.9-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-4641&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4641&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56433&#34;,&#xA;                &#34;title&#34; : &#34;shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.6,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56433&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-4641&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4641&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/rsync@3.2.3-19.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rsync-3.2.3-19.el9.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2024-12084&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-12084&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-12085&#34;,&#xA;              &#34;title&#34; : &#34;Rsync: info leak via uninitialized stack contents&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-12085&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-12087&#34;,&#xA;              &#34;title&#34; : &#34;Rsync: path traversal vulnerability in rsync&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-12087&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-12088&#34;,&#xA;              &#34;title&#34; : &#34;Rsync: --safe-links option bypass leads to path traversal&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-12088&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-12086&#34;,&#xA;              &#34;title&#34; : &#34;Rsync: rsync server leaks arbitrary client files&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.1,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-12086&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-12747&#34;,&#xA;              &#34;title&#34; : &#34;Rsync: race condition in rsync handling symbolic links&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.6,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-12747&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-10158&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 4.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-10158&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-12084&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-12084&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=cyrus-sasl-2.1.27-21.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28390&#34;,&#xA;                &#34;title&#34; : &#34;Possible NULL Dereference When Processing CMS KeyTransportRecipientInfo&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28390&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9231&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9231&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28388&#34;,&#xA;                &#34;title&#34; : &#34;NULL Pointer Dereference When Processing a Delta CRL&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28388&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28389&#34;,&#xA;                &#34;title&#34; : &#34;Possible NULL Dereference When Processing CMS KeyAgreeRecipientInfo&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28389&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-31790&#34;,&#xA;                &#34;title&#34; : &#34;Incorrect Failure Handling in RSA KEM RSASVE Encapsulation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-31790&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-31789&#34;,&#xA;                &#34;title&#34; : &#34;Heap Buffer Overflow in Hexadecimal Conversion&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-31789&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28386&#34;,&#xA;                &#34;title&#34; : &#34;Out-of-bounds Read in AES-CFB-128 on X86-64 with AVX-512 Support&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28386&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28387&#34;,&#xA;                &#34;title&#34; : &#34;Potential Use-after-free in DANE Client Code&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28387&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.1,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2673&#34;,&#xA;                &#34;title&#34; : &#34;OpenSSL TLS 1.3 server may choose unexpected key agreement group&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.1,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2673&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=krb5-1.20.1-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39975&#34;,&#xA;                &#34;title&#34; : &#34;kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26462&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37370&#34;,&#xA;                &#34;title&#34; : &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37370&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-36054&#34;,&#xA;                &#34;title&#34; : &#34;lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-36054&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37371&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37371&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24528&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24528&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26458&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26461&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26461&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3576&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3576&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/pam@1.5.1-14.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=pam-1.5.1-14.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6020&#34;,&#xA;                &#34;title&#34; : &#34;Linux-pam: linux-pam directory traversal&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6020&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8941&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8941&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-10963&#34;,&#xA;                &#34;title&#34; : &#34;Pam: improper hostname interpretation in pam_access leads to access control bypass&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-10963&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-22365&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-22365&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-10041&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-10041&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6020&#34;,&#xA;                &#34;title&#34; : &#34;Linux-pam: linux-pam directory traversal&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6020&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/systemd@252-13.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=systemd-252-13.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-29111&#34;,&#xA;                &#34;title&#34; : &#34;systemd: Local unprivileged user can trigger an assert&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-29111&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-40224&#34;,&#xA;                &#34;title&#34; : &#34;In systemd 259 before 260, there is local privilege escalation in systemd-machined because varlink can be used to reach the root namespace.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-40224&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4105&#34;,&#xA;                &#34;title&#34; : &#34;Systemd: systemd: privilege escalation via improper access control in registermachine d-bus method&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4105&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-40225&#34;,&#xA;                &#34;title&#34; : &#34;In udev in systemd before 260, local root execution can occur via malicious hardware devices and unsanitized kernel output.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-40225&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-40226&#34;,&#xA;                &#34;title&#34; : &#34;In nspawn in systemd 233 through 259 before 260, an escape-to-host action can occur via a crafted optional config file.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-40226&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-40227&#34;,&#xA;                &#34;title&#34; : &#34;In systemd 260 before 261, a local unprivileged user can trigger an assert via an IPC API call with an array or map that has a null element.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-40227&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4598&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4598&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-40223&#34;,&#xA;                &#34;title&#34; : &#34;In systemd 258 before 260, a local unprivileged user can trigger an assert when a Delegate=yes and User=&lt;unset&gt; unit exists and is running.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-40223&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-40228&#34;,&#xA;                &#34;title&#34; : &#34;In systemd 259, systemd-journald can send ANSI escape sequences to the terminals of arbitrary users when a \&#34;logger -p emerg\&#34; command is executed, if ForwardToWall=yes is set.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.9,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-40228&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-29111&#34;,&#xA;                &#34;title&#34; : &#34;systemd: Local unprivileged user can trigger an assert&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-29111&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libgcrypt-1.10.0-10.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2236&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2236&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41990&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 mishandles Dilithium signing. Writes to a static array lack a bounds check but do not use attacker-controlled data.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=expat-2.5.0-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28757&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45490&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8176&#34;,&#xA;                &#34;title&#34; : &#34;Libexpat: expat: improper restriction of xml entity expansion depth in libexpat&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45492&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45492&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50602&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59375&#34;,&#xA;                &#34;title&#34; : &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59375&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41080&#34;,&#xA;                &#34;title&#34; : &#34;libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41080&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openldap@2.6.2-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=openldap-2.6.2-3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libeconf@0.4.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libeconf-0.4.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-22652&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in \&#34;read_file\&#34; function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-22652&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-22652&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in \&#34;read_file\&#34; function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-22652&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/dbus-common@1.12.20-7.el9_1?arch=noarch&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=dbus-1.12.20-7.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-34969&#34;,&#xA;                &#34;title&#34; : &#34;D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-34969&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-34969&#34;,&#xA;                &#34;title&#34; : &#34;D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-34969&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=dbus-1.12.20-7.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-34969&#34;,&#xA;                &#34;title&#34; : &#34;D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-34969&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-34969&#34;,&#xA;                &#34;title&#34; : &#34;D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-34969&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=gmp-6.2.0-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27456&#34;,&#xA;                &#34;title&#34; : &#34;util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27456&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3184&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: access control bypass due to improper hostname canonicalization&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3184&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libsmartcols@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/util-linux@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27456&#34;,&#xA;                &#34;title&#34; : &#34;util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27456&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3184&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: access control bypass due to improper hostname canonicalization&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3184&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libfdisk@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/util-linux-core@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/systemd-pam@252-13.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=systemd-252-13.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4598&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4598&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/systemd-rpm-macros@252-13.el9_2?arch=noarch&amp;distro=rhel-9.2&amp;upstream=systemd-252-13.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4598&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4598&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/systemd-libs@252-13.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=systemd-252-13.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4598&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4598&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=2&amp;upstream=shadow-utils-4.9-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-4641&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4641&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56433&#34;,&#xA;                &#34;title&#34; : &#34;shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.6,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56433&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-4641&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4641&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-pysocks@1.7.1-12.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-pysocks-1.7.1-12.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-setuptools-53.0.0-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-47273&#34;,&#xA;                &#34;title&#34; : &#34;setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-47273&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5713&#34;,&#xA;                &#34;title&#34; : &#34;Out-of-bounds read/write during remote profiling and asyncio process introspection when connecting to malicious target&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5713&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13837&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13837&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4224&#34;,&#xA;                &#34;title&#34; : &#34;Stack overflow parsing XML with deeply nested DTD content models&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4224&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3644&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete control character validation in http.cookies&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3644&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12781&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12781&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3446&#34;,&#xA;                &#34;title&#34; : &#34;Base64 decoding stops at first padded quad by default&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15282&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15282&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1502&#34;,&#xA;                &#34;title&#34; : &#34;HTTP client proxy tunnel headers not validated for CR/LF&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1502&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2297&#34;,&#xA;                &#34;title&#34; : &#34;SourcelessFileLoader does not use io.open_code()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2297&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3479&#34;,&#xA;                &#34;title&#34; : &#34;pkgutil.get_data() does not enforce documented restrictions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3479&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13462&#34;,&#xA;                &#34;title&#34; : &#34;tarfile: Skip DIRTYPE normalization during GNU LONGNAME/LONGLINK handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=sqlite-3.34.1-6.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-7104&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3277&#34;,&#xA;                &#34;title&#34; : &#34;An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3277&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=expat-2.5.0-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28757&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45490&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8176&#34;,&#xA;                &#34;title&#34; : &#34;Libexpat: expat: improper restriction of xml entity expansion depth in libexpat&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45492&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45492&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50602&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59375&#34;,&#xA;                &#34;title&#34; : &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59375&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41080&#34;,&#xA;                &#34;title&#34; : &#34;libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41080&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-pip-21.2.3-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-six-1.15.0-9.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-setuptools-53.0.0-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-47273&#34;,&#xA;                &#34;title&#34; : &#34;setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-47273&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5713&#34;,&#xA;                &#34;title&#34; : &#34;Out-of-bounds read/write during remote profiling and asyncio process introspection when connecting to malicious target&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5713&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13837&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13837&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4224&#34;,&#xA;                &#34;title&#34; : &#34;Stack overflow parsing XML with deeply nested DTD content models&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4224&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3644&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete control character validation in http.cookies&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3644&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12781&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12781&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3446&#34;,&#xA;                &#34;title&#34; : &#34;Base64 decoding stops at first padded quad by default&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15282&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15282&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1502&#34;,&#xA;                &#34;title&#34; : &#34;HTTP client proxy tunnel headers not validated for CR/LF&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1502&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2297&#34;,&#xA;                &#34;title&#34; : &#34;SourcelessFileLoader does not use io.open_code()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2297&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3479&#34;,&#xA;                &#34;title&#34; : &#34;pkgutil.get_data() does not enforce documented restrictions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3479&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13462&#34;,&#xA;                &#34;title&#34; : &#34;tarfile: Skip DIRTYPE normalization during GNU LONGNAME/LONGLINK handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=sqlite-3.34.1-6.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-7104&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3277&#34;,&#xA;                &#34;title&#34; : &#34;An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3277&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=expat-2.5.0-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28757&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45490&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8176&#34;,&#xA;                &#34;title&#34; : &#34;Libexpat: expat: improper restriction of xml entity expansion depth in libexpat&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45492&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45492&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50602&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59375&#34;,&#xA;                &#34;title&#34; : &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59375&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41080&#34;,&#xA;                &#34;title&#34; : &#34;libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41080&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-pip-21.2.3-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=pygobject3-3.40.1-6.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-setuptools-53.0.0-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-47273&#34;,&#xA;                &#34;title&#34; : &#34;setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-47273&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5713&#34;,&#xA;                &#34;title&#34; : &#34;Out-of-bounds read/write during remote profiling and asyncio process introspection when connecting to malicious target&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5713&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13837&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13837&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4224&#34;,&#xA;                &#34;title&#34; : &#34;Stack overflow parsing XML with deeply nested DTD content models&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4224&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3644&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete control character validation in http.cookies&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3644&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12781&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12781&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3446&#34;,&#xA;                &#34;title&#34; : &#34;Base64 decoding stops at first padded quad by default&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15282&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15282&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1502&#34;,&#xA;                &#34;title&#34; : &#34;HTTP client proxy tunnel headers not validated for CR/LF&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1502&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2297&#34;,&#xA;                &#34;title&#34; : &#34;SourcelessFileLoader does not use io.open_code()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2297&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3479&#34;,&#xA;                &#34;title&#34; : &#34;pkgutil.get_data() does not enforce documented restrictions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3479&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13462&#34;,&#xA;                &#34;title&#34; : &#34;tarfile: Skip DIRTYPE normalization during GNU LONGNAME/LONGLINK handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=sqlite-3.34.1-6.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-7104&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3277&#34;,&#xA;                &#34;title&#34; : &#34;An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3277&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glib2-2.68.4-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13601&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in in g_escape_uri_string()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-52533&#34;,&#xA;                &#34;title&#34; : &#34;gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing &#39;\\0&#39; character.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-52533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32611&#34;,&#xA;                &#34;title&#34; : &#34;G_variant_byteswap() can take a long time with some non-normal inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32611&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32665&#34;,&#xA;                &#34;title&#34; : &#34;Gvariant deserialisation does not match spec for non-normal data&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32665&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14512&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in glib gio attribute escaping causes heap buffer overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14512&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-29499&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29499&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14087&#34;,&#xA;                &#34;title&#34; : &#34;Glib: glib: buffer underflow in gvariant parser leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14087&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4373&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4373&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-34397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.8,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-34397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7039&#34;,&#xA;                &#34;title&#34; : &#34;Glib: buffer under-read on glib through glib/gfileutils.c via get_tmp_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7039&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0988&#34;,&#xA;                &#34;title&#34; : &#34;Glib: glib: denial of service via integer overflow in g_buffered_input_stream_peek()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0988&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13601&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in in g_escape_uri_string()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gnutls-3.7.6-20.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-0553&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: incomplete fix for cve-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0553&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0567&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0567&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32988&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls othername san export&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32988&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32990&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls certtool template parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6395&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: null pointer dereference in _gnutls_figure_common_ciphersuite()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5981&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12243&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: gnutls impacted by inefficient der decoding in libtasn1 leading to remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12243&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28834&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28834&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14831&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: gnutls: denial of service via excessive resource consumption during certificate verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14831&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32989&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls sct extension parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28835&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28835&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9820&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: stack-based buffer overflow in gnutls_pkcs11_token_init() function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9820&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-0553&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: incomplete fix for cve-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0553&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=expat-2.5.0-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28757&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45490&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8176&#34;,&#xA;                &#34;title&#34; : &#34;Libexpat: expat: improper restriction of xml entity expansion depth in libexpat&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45492&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45492&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50602&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59375&#34;,&#xA;                &#34;title&#34; : &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59375&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41080&#34;,&#xA;                &#34;title&#34; : &#34;libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41080&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27456&#34;,&#xA;                &#34;title&#34; : &#34;util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27456&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3184&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: access control bypass due to improper hostname canonicalization&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3184&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-pip-21.2.3-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=redhat-rpm-config-199-1.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libxml2-2.9.13-3.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49794&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: heap use after free (uaf) leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49794&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49796&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: type confusion leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56171&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56171&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24928&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24928&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7425&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: libxml2: heap use-after-free in libxslt caused by atype corruption in xmlattrptr&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-25062&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-25062&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32415&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32415&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49795&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: null pointer dereference leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6021&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6021&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7424&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: type confusion in xmlnode.psvi between stylesheet and source nodes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7424&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39615&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39615&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6732&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via crafted xsd-validated document&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6732&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9714&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9714&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1757&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: memory leak leading to local denial of service in xmllint interactive shell&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-49043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-49043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28484&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28484&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-29469&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the &#39;\\0&#39; value).&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0990&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via uncontrolled recursion in xml catalog processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32414&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32414&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-26434&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2, there is a possible out of bounds read due to a buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-26434&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0989&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: unbounded relaxng include recursion leading to stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0992&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via crafted xml catalogs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.9,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0992&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6170&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: stack buffer overflow in xmllint interactive shell command handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6170&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=krb5-1.20.1-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39975&#34;,&#xA;                &#34;title&#34; : &#34;kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26462&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37370&#34;,&#xA;                &#34;title&#34; : &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37370&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-36054&#34;,&#xA;                &#34;title&#34; : &#34;lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-36054&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37371&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37371&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24528&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24528&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26458&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26461&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26461&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3576&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3576&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=curl-7.76.1-23.el9_2.1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2398&#34;,&#xA;                &#34;title&#34; : &#34;HTTP/2 push headers memory-leak&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2398&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27536&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists libcurl &lt;8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27536&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28321&#34;,&#xA;                &#34;title&#34; : &#34;An improper certificate validation vulnerability exists in curl &lt;v8.1.0 in the way it supports matching of wildcard patterns when listed as \&#34;Subject Alternative Name\&#34; in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28321&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27538&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27538&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-46218&#34;,&#xA;                &#34;title&#34; : &#34;This flaw allows a malicious HTTP server to set \&#34;super cookies\&#34; in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl&#39;s function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-46218&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9086&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9086&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27533&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability in input validation exists in curl &lt;8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \&#34;telnet options\&#34; during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application&#39;s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27534&#34;,&#xA;                &#34;title&#34; : &#34;A path traversal vulnerability exists in curl &lt;8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27534&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28322&#34;,&#xA;                &#34;title&#34; : &#34;An information disclosure vulnerability exists in curl &lt;v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28322&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38546&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38546&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=curl-7.76.1-23.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2398&#34;,&#xA;                &#34;title&#34; : &#34;HTTP/2 push headers memory-leak&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2398&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27535&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl &lt;8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27536&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists libcurl &lt;8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27536&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28321&#34;,&#xA;                &#34;title&#34; : &#34;An improper certificate validation vulnerability exists in curl &lt;v8.1.0 in the way it supports matching of wildcard patterns when listed as \&#34;Subject Alternative Name\&#34; in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28321&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27538&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27538&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-46218&#34;,&#xA;                &#34;title&#34; : &#34;This flaw allows a malicious HTTP server to set \&#34;super cookies\&#34; in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl&#39;s function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-46218&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9086&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9086&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27533&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability in input validation exists in curl &lt;8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \&#34;telnet options\&#34; during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application&#39;s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27534&#34;,&#xA;                &#34;title&#34; : &#34;A path traversal vulnerability exists in curl &lt;8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27534&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28322&#34;,&#xA;                &#34;title&#34; : &#34;An information disclosure vulnerability exists in curl &lt;v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28322&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38546&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38546&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-31486&#34;,&#xA;                &#34;title&#34; : &#34;HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31486&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-31486&#34;,&#xA;                &#34;title&#34; : &#34;HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31486&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libarchive-3.5.3-4.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-5914&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5914&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4111&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: infinite loop denial of service in rar5 decompression via archive_read_data() in libarchive&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4111&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4424&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: libarchive: information disclosure via heap out-of-bounds read in rar archive processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4424&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5121&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: libarchive: arbitrary code execution via integer overflow in iso9660 image processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5121&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-60753&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-60753&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-57970&#34;,&#xA;                &#34;title&#34; : &#34;libarchive through 3.7.7 has a heap-based buffer over-read in header_gnu_longlink in archive_read_support_format_tar.c via a TAR archive because it mishandles truncation in the middle of a GNU long linkname.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-57970&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-25724&#34;,&#xA;                &#34;title&#34; : &#34;list_item_verbose in tar/util.c in libarchive through 3.7.7 does not check an strftime return value, which can lead to a denial of service or unspecified other impact via a crafted TAR archive that is read with a verbose value of 2. For example, the 100-byte buffer may not be sufficient for a custom locale.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-25724&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-5914&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5914&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=sqlite-3.34.1-6.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-7104&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3277&#34;,&#xA;                &#34;title&#34; : &#34;An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3277&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/go-srpm-macros@3.2.0-1.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=go-rpm-macros-3.2.0-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-61726&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-61726&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-25679&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-25679&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-47906&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-47906&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-61726&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-61726&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=nghttp2-1.43.0-5.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27135&#34;,&#xA;                &#34;title&#34; : &#34;nghttp2 Denial of service: Assertion failure due to the missing state validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27135&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28182&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28182&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-mro@1.23-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Class-Struct@0.66-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-subs@1.03-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-interpreter@5.32.1-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=4&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-overload@1.31-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-libs@5.32.1-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=4&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-File-stat@1.09-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-IO@1.43-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-File-Basename@2.85-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-POSIX@1.94-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Symbol@1.08-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-SelectSaver@1.02-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Getopt-Std@1.12-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-vars@1.05-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-if@0.60.800-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Fcntl@1.13-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-IPC-Open3@1.21-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Errno@1.30-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-overloading@0.02-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=perl-constant-1.33-461.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Storable@3.21-460.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=perl-Storable-3.21-460.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2017-20230&#34;,&#xA;                &#34;title&#34; : &#34;Storable versions before 3.05 for Perl has a stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2017-20230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2017-20230&#34;,&#xA;                &#34;title&#34; : &#34;Storable versions before 3.05 for Perl has a stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2017-20230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/qt5-srpm-macros@5.15.3-1.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=qt5-5.15.3-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-32573&#34;,&#xA;                &#34;title&#34; : &#34;In Qt before 5.15.14, 6.0.x through 6.2.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1, QtSvg QSvgFont m_unitsPerEm initialization is mishandled.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32573&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-33285&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in Qt 5.x before 5.15.14, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1. QDnsLookup has a buffer over-read via a crafted reply from a DNS server.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-33285&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-34410&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in Qt before 5.15.15, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.2. Certificate validation for TLS does not always consider whether the root of a chain is a configured CA certificate.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-34410&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-32573&#34;,&#xA;                &#34;title&#34; : &#34;In Qt before 5.15.14, 6.0.x through 6.2.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1, QtSvg QSvgFont m_unitsPerEm initialization is mishandled.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32573&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/rpm@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=gmp-6.2.0-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/file@5.39-12.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=file-5.39-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2022-48554&#34;,&#xA;                &#34;title&#34; : &#34;File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: \&#34;File\&#34; is the name of an Open Source project.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-48554&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2022-48554&#34;,&#xA;                &#34;title&#34; : &#34;File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: \&#34;File\&#34; is the name of an Open Source project.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-48554&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/file-libs@5.39-12.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=file-5.39-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2022-48554&#34;,&#xA;                &#34;title&#34; : &#34;File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: \&#34;File\&#34; is the name of an Open Source project.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-48554&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2022-48554&#34;,&#xA;                &#34;title&#34; : &#34;File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: \&#34;File\&#34; is the name of an Open Source project.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-48554&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/procps-ng@3.3.17-11.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=procps-ng-3.3.17-11.el9.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2023-4016&#34;,&#xA;              &#34;title&#34; : &#34;Under some circumstances, this weakness allows a user who has access to run the “ps” utility on a machine, the ability to write almost unlimited amounts of unfiltered data into the process heap.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 3.3,&#xA;              &#34;severity&#34; : &#34;LOW&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-4016&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libgcrypt-1.10.0-10.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2236&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2236&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41990&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 mishandles Dilithium signing. Writes to a static array lack a bounds check but do not use attacker-controlled data.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/systemd-libs@252-13.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=systemd-252-13.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4598&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4598&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/crypto-policies-scripts@20221215-1.git9a18988.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=crypto-policies-20221215-1.git9a18988.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-setuptools-53.0.0-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-47273&#34;,&#xA;                &#34;title&#34; : &#34;setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-47273&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5713&#34;,&#xA;                &#34;title&#34; : &#34;Out-of-bounds read/write during remote profiling and asyncio process introspection when connecting to malicious target&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5713&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13837&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13837&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4224&#34;,&#xA;                &#34;title&#34; : &#34;Stack overflow parsing XML with deeply nested DTD content models&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4224&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3644&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete control character validation in http.cookies&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3644&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12781&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12781&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3446&#34;,&#xA;                &#34;title&#34; : &#34;Base64 decoding stops at first padded quad by default&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15282&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15282&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1502&#34;,&#xA;                &#34;title&#34; : &#34;HTTP client proxy tunnel headers not validated for CR/LF&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1502&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2297&#34;,&#xA;                &#34;title&#34; : &#34;SourcelessFileLoader does not use io.open_code()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2297&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3479&#34;,&#xA;                &#34;title&#34; : &#34;pkgutil.get_data() does not enforce documented restrictions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3479&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13462&#34;,&#xA;                &#34;title&#34; : &#34;tarfile: Skip DIRTYPE normalization during GNU LONGNAME/LONGLINK handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=sqlite-3.34.1-6.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-7104&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3277&#34;,&#xA;                &#34;title&#34; : &#34;An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3277&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=expat-2.5.0-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28757&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45490&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8176&#34;,&#xA;                &#34;title&#34; : &#34;Libexpat: expat: improper restriction of xml entity expansion depth in libexpat&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45492&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45492&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50602&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59375&#34;,&#xA;                &#34;title&#34; : &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59375&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41080&#34;,&#xA;                &#34;title&#34; : &#34;libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41080&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-pip-21.2.3-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-31486&#34;,&#xA;                &#34;title&#34; : &#34;HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31486&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-31486&#34;,&#xA;                &#34;title&#34; : &#34;HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31486&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-POSIX@1.94-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Symbol@1.08-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-mro@1.23-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-AutoLoader@5.74-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-SelectSaver@1.02-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Getopt-Std@1.12-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Class-Struct@0.66-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-subs@1.03-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-vars@1.05-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-interpreter@5.32.1-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=4&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-overload@1.31-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-libs@5.32.1-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=4&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-B@1.80-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-if@0.60.800-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-File-stat@1.09-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Fcntl@1.13-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-IO@1.43-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-File-Basename@2.85-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-base@2.27-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-IPC-Open3@1.21-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Errno@1.30-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-overloading@0.02-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=perl-Digest-1.19-4.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=perl-constant-1.33-461.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Storable@3.21-460.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=perl-Storable-3.21-460.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2017-20230&#34;,&#xA;                &#34;title&#34; : &#34;Storable versions before 3.05 for Perl has a stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2017-20230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2017-20230&#34;,&#xA;                &#34;title&#34; : &#34;Storable versions before 3.05 for Perl has a stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2017-20230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2023-43622&#34;,&#xA;              &#34;title&#34; : &#34;Apache HTTP Server: DoS in HTTP/2 with initial windows size 0&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-43622&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-45802&#34;,&#xA;              &#34;title&#34; : &#34;Apache HTTP Server: HTTP/2 stream memory not reclaimed right away on RST&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-45802&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-27316&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-27316&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-49630&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-49630&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-36387&#34;,&#xA;              &#34;title&#34; : &#34;Apache HTTP Server: DoS by Null pointer in websocket over HTTP/2&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 3.7,&#xA;              &#34;severity&#34; : &#34;LOW&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-36387&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.5?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=httpd-2.4.53-11.el9_2.5.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38475&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38475&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38476&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38476&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27522&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27522&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-31122&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_macro buffer over-read&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31122&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38477&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38477&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-47252&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-47252&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-23048&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-23048&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49812&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49812&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-39573&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-39573&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-58098&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-58098&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38709&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38709&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-65082&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-65082&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66200&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66200&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38473&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server proxy encoding problem&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38473&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-24795&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: HTTP Response Splitting in multiple modules&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-24795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.5?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=httpd-2.4.53-11.el9_2.5.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38475&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38475&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38476&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38476&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27522&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27522&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-31122&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_macro buffer over-read&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31122&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38477&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38477&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-47252&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-47252&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-23048&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-23048&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49812&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49812&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-39573&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-39573&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-58098&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-58098&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38709&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38709&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-65082&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-65082&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66200&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66200&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38473&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server proxy encoding problem&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38473&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-24795&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: HTTP Response Splitting in multiple modules&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-24795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/httpd-filesystem@2.4.53-11.el9_2.5?arch=noarch&amp;distro=rhel-9.2&amp;upstream=httpd-2.4.53-11.el9_2.5.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38475&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38475&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38476&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38476&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27522&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27522&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-31122&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_macro buffer over-read&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31122&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38477&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38477&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-47252&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-47252&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-23048&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-23048&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49812&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49812&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59775&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59775&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-39573&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-39573&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-58098&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-58098&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38709&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38709&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-65082&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-65082&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66200&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66200&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38473&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server proxy encoding problem&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38473&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-24795&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: HTTP Response Splitting in multiple modules&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-24795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=expat-2.5.0-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28757&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45490&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8176&#34;,&#xA;                &#34;title&#34; : &#34;Libexpat: expat: improper restriction of xml entity expansion depth in libexpat&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45492&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45492&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50602&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59375&#34;,&#xA;                &#34;title&#34; : &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59375&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41080&#34;,&#xA;                &#34;title&#34; : &#34;libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41080&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=nghttp2-1.43.0-5.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27135&#34;,&#xA;                &#34;title&#34; : &#34;nghttp2 Denial of service: Assertion failure due to the missing state validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27135&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28182&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28182&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/apr@1.7.0-11.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=apr-1.7.0-11.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2022-24963&#34;,&#xA;                &#34;title&#34; : &#34;Apache Portable Runtime (APR): out-of-bound writes in the apr_encode family of functions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-24963&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2022-24963&#34;,&#xA;                &#34;title&#34; : &#34;Apache Portable Runtime (APR): out-of-bound writes in the apr_encode family of functions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-24963&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=2&amp;upstream=shadow-utils-4.9-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-4641&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4641&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56433&#34;,&#xA;                &#34;title&#34; : &#34;shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.6,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56433&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-4641&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4641&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;              &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.5?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=httpd-2.4.53-11.el9_2.5.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;              &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-38475&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.1,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-38475&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-38476&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.1,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-38476&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-27522&#34;,&#xA;              &#34;title&#34; : &#34;Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-27522&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-31122&#34;,&#xA;              &#34;title&#34; : &#34;Apache HTTP Server: mod_macro buffer over-read&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-31122&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-38477&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-38477&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-47252&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-47252&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-23048&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-23048&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-49812&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-49812&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-39573&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.4,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-39573&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-58098&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.1,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-58098&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-38709&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.8,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-38709&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-65082&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-65082&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-66200&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.4,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-66200&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-38473&#34;,&#xA;              &#34;title&#34; : &#34;Apache HTTP Server proxy encoding problem&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-38473&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-24795&#34;,&#xA;              &#34;title&#34; : &#34;Apache HTTP Server: HTTP Response Splitting in multiple modules&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 4.0,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-24795&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.5?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=httpd-2.4.53-11.el9_2.5.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38475&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38475&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38476&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38476&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27522&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27522&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-31122&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_macro buffer over-read&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31122&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38477&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38477&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-47252&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-47252&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-23048&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-23048&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49812&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49812&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-39573&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-39573&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-58098&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-58098&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38709&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38709&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-65082&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-65082&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66200&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66200&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38473&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server proxy encoding problem&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38473&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-24795&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: HTTP Response Splitting in multiple modules&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-24795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.5?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=httpd-2.4.53-11.el9_2.5.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38475&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38475&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38476&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38476&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27522&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27522&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-31122&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_macro buffer over-read&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31122&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38477&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38477&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-47252&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-47252&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-23048&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-23048&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49812&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49812&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-39573&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-39573&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-58098&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-58098&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38709&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38709&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-65082&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-65082&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66200&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66200&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38473&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server proxy encoding problem&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38473&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-24795&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: HTTP Response Splitting in multiple modules&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-24795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/httpd-filesystem@2.4.53-11.el9_2.5?arch=noarch&amp;distro=rhel-9.2&amp;upstream=httpd-2.4.53-11.el9_2.5.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38475&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38475&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38476&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38476&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27522&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27522&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-31122&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_macro buffer over-read&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31122&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38477&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38477&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-47252&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-47252&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-23048&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-23048&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49812&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49812&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59775&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59775&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-39573&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-39573&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-58098&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-58098&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38709&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38709&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-65082&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-65082&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66200&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66200&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38473&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server proxy encoding problem&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38473&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-24795&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: HTTP Response Splitting in multiple modules&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-24795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=expat-2.5.0-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28757&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45490&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8176&#34;,&#xA;                &#34;title&#34; : &#34;Libexpat: expat: improper restriction of xml entity expansion depth in libexpat&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45492&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45492&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50602&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59375&#34;,&#xA;                &#34;title&#34; : &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59375&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41080&#34;,&#xA;                &#34;title&#34; : &#34;libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41080&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/apr@1.7.0-11.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=apr-1.7.0-11.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2022-24963&#34;,&#xA;                &#34;title&#34; : &#34;Apache Portable Runtime (APR): out-of-bound writes in the apr_encode family of functions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-24963&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2022-24963&#34;,&#xA;                &#34;title&#34; : &#34;Apache Portable Runtime (APR): out-of-bound writes in the apr_encode family of functions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-24963&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=2&amp;upstream=shadow-utils-4.9-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-4641&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4641&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56433&#34;,&#xA;                &#34;title&#34; : &#34;shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.6,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56433&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-4641&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4641&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;              &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=httpd-2.4.53-11.el9_2.5.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;              &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-38475&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.1,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-38475&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-38476&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.1,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-38476&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-27522&#34;,&#xA;              &#34;title&#34; : &#34;Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-27522&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-31122&#34;,&#xA;              &#34;title&#34; : &#34;Apache HTTP Server: mod_macro buffer over-read&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-31122&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-38477&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-38477&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-47252&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-47252&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-23048&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-23048&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-49812&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-49812&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-39573&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.4,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-39573&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-58098&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.1,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-58098&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-38709&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.8,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-38709&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-65082&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-65082&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-66200&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.4,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-66200&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-38473&#34;,&#xA;              &#34;title&#34; : &#34;Apache HTTP Server proxy encoding problem&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-38473&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-24795&#34;,&#xA;              &#34;title&#34; : &#34;Apache HTTP Server: HTTP Response Splitting in multiple modules&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 4.0,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-24795&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.5?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=httpd-2.4.53-11.el9_2.5.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38475&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38475&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38476&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38476&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27522&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27522&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-31122&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_macro buffer over-read&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31122&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38477&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38477&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-47252&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-47252&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-23048&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-23048&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49812&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49812&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-39573&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-39573&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-58098&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-58098&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38709&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38709&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-65082&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-65082&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66200&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66200&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38473&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server proxy encoding problem&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38473&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-24795&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: HTTP Response Splitting in multiple modules&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-24795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.5?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=httpd-2.4.53-11.el9_2.5.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38475&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38475&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38476&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38476&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27522&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27522&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-31122&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_macro buffer over-read&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31122&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38477&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38477&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-47252&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-47252&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-23048&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-23048&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49812&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49812&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-39573&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-39573&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-58098&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-58098&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38709&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38709&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-65082&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-65082&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66200&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66200&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38473&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server proxy encoding problem&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38473&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-24795&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: HTTP Response Splitting in multiple modules&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-24795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/httpd-filesystem@2.4.53-11.el9_2.5?arch=noarch&amp;distro=rhel-9.2&amp;upstream=httpd-2.4.53-11.el9_2.5.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38475&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38475&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38476&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38476&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27522&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27522&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-31122&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_macro buffer over-read&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31122&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38477&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38477&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-47252&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-47252&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-23048&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-23048&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49812&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49812&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59775&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59775&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-39573&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-39573&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-58098&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-58098&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38709&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38709&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-65082&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-65082&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66200&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66200&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38473&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server proxy encoding problem&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38473&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-24795&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: HTTP Response Splitting in multiple modules&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-24795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28390&#34;,&#xA;                &#34;title&#34; : &#34;Possible NULL Dereference When Processing CMS KeyTransportRecipientInfo&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28390&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9231&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9231&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28388&#34;,&#xA;                &#34;title&#34; : &#34;NULL Pointer Dereference When Processing a Delta CRL&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28388&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28389&#34;,&#xA;                &#34;title&#34; : &#34;Possible NULL Dereference When Processing CMS KeyAgreeRecipientInfo&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28389&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-31790&#34;,&#xA;                &#34;title&#34; : &#34;Incorrect Failure Handling in RSA KEM RSASVE Encapsulation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-31790&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-31789&#34;,&#xA;                &#34;title&#34; : &#34;Heap Buffer Overflow in Hexadecimal Conversion&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-31789&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28386&#34;,&#xA;                &#34;title&#34; : &#34;Out-of-bounds Read in AES-CFB-128 on X86-64 with AVX-512 Support&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28386&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28387&#34;,&#xA;                &#34;title&#34; : &#34;Potential Use-after-free in DANE Client Code&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28387&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.1,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2673&#34;,&#xA;                &#34;title&#34; : &#34;OpenSSL TLS 1.3 server may choose unexpected key agreement group&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.1,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2673&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=krb5-1.20.1-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39975&#34;,&#xA;                &#34;title&#34; : &#34;kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26462&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37370&#34;,&#xA;                &#34;title&#34; : &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37370&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-36054&#34;,&#xA;                &#34;title&#34; : &#34;lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-36054&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37371&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37371&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24528&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24528&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26458&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26461&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26461&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3576&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3576&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-31486&#34;,&#xA;                &#34;title&#34; : &#34;HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31486&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-31486&#34;,&#xA;                &#34;title&#34; : &#34;HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31486&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/pam@1.5.1-14.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=pam-1.5.1-14.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6020&#34;,&#xA;                &#34;title&#34; : &#34;Linux-pam: linux-pam directory traversal&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6020&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8941&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8941&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-10963&#34;,&#xA;                &#34;title&#34; : &#34;Pam: improper hostname interpretation in pam_access leads to access control bypass&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-10963&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-22365&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-22365&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-10041&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-10041&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6020&#34;,&#xA;                &#34;title&#34; : &#34;Linux-pam: linux-pam directory traversal&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6020&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/systemd@252-13.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=systemd-252-13.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-29111&#34;,&#xA;                &#34;title&#34; : &#34;systemd: Local unprivileged user can trigger an assert&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-29111&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-40224&#34;,&#xA;                &#34;title&#34; : &#34;In systemd 259 before 260, there is local privilege escalation in systemd-machined because varlink can be used to reach the root namespace.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-40224&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4105&#34;,&#xA;                &#34;title&#34; : &#34;Systemd: systemd: privilege escalation via improper access control in registermachine d-bus method&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4105&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-40225&#34;,&#xA;                &#34;title&#34; : &#34;In udev in systemd before 260, local root execution can occur via malicious hardware devices and unsanitized kernel output.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-40225&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-40226&#34;,&#xA;                &#34;title&#34; : &#34;In nspawn in systemd 233 through 259 before 260, an escape-to-host action can occur via a crafted optional config file.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-40226&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-40227&#34;,&#xA;                &#34;title&#34; : &#34;In systemd 260 before 261, a local unprivileged user can trigger an assert via an IPC API call with an array or map that has a null element.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-40227&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4598&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4598&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-40223&#34;,&#xA;                &#34;title&#34; : &#34;In systemd 258 before 260, a local unprivileged user can trigger an assert when a Delegate=yes and User=&lt;unset&gt; unit exists and is running.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-40223&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-40228&#34;,&#xA;                &#34;title&#34; : &#34;In systemd 259, systemd-journald can send ANSI escape sequences to the terminals of arbitrary users when a \&#34;logger -p emerg\&#34; command is executed, if ForwardToWall=yes is set.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.9,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-40228&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-29111&#34;,&#xA;                &#34;title&#34; : &#34;systemd: Local unprivileged user can trigger an assert&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-29111&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=expat-2.5.0-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28757&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45490&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8176&#34;,&#xA;                &#34;title&#34; : &#34;Libexpat: expat: improper restriction of xml entity expansion depth in libexpat&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45492&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45492&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50602&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59375&#34;,&#xA;                &#34;title&#34; : &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59375&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41080&#34;,&#xA;                &#34;title&#34; : &#34;libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41080&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/expat-devel@2.5.0-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=expat-2.5.0-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28757&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45490&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8176&#34;,&#xA;                &#34;title&#34; : &#34;Libexpat: expat: improper restriction of xml entity expansion depth in libexpat&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45492&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45492&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50602&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59375&#34;,&#xA;                &#34;title&#34; : &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59375&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libgcrypt-1.10.0-10.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2236&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2236&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41990&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 mishandles Dilithium signing. Writes to a static array lack a bounds check but do not use attacker-controlled data.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-mro@1.23-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Class-Struct@0.66-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-subs@1.03-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-interpreter@5.32.1-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=4&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-overload@1.31-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-libs@5.32.1-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=4&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-File-stat@1.09-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-IO@1.43-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-File-Basename@2.85-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-POSIX@1.94-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Symbol@1.08-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-SelectSaver@1.02-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Getopt-Std@1.12-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-vars@1.05-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-if@0.60.800-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Fcntl@1.13-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-IPC-Open3@1.21-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Errno@1.30-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-overloading@0.02-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openldap@2.6.2-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=openldap-2.6.2-3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=openldap-2.6.2-3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=perl-constant-1.33-461.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libeconf@0.4.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libeconf-0.4.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-22652&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in \&#34;read_file\&#34; function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-22652&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-22652&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in \&#34;read_file\&#34; function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-22652&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/apr-devel@1.7.0-11.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=apr-1.7.0-11.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2022-24963&#34;,&#xA;                &#34;title&#34; : &#34;Apache Portable Runtime (APR): out-of-bound writes in the apr_encode family of functions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-24963&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2022-24963&#34;,&#xA;                &#34;title&#34; : &#34;Apache Portable Runtime (APR): out-of-bound writes in the apr_encode family of functions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-24963&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/apr@1.7.0-11.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=apr-1.7.0-11.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2022-24963&#34;,&#xA;                &#34;title&#34; : &#34;Apache Portable Runtime (APR): out-of-bound writes in the apr_encode family of functions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-24963&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2022-24963&#34;,&#xA;                &#34;title&#34; : &#34;Apache Portable Runtime (APR): out-of-bound writes in the apr_encode family of functions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-24963&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Storable@3.21-460.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=perl-Storable-3.21-460.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2017-20230&#34;,&#xA;                &#34;title&#34; : &#34;Storable versions before 3.05 for Perl has a stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2017-20230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2017-20230&#34;,&#xA;                &#34;title&#34; : &#34;Storable versions before 3.05 for Perl has a stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2017-20230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/dbus-common@1.12.20-7.el9_1?arch=noarch&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=dbus-1.12.20-7.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-34969&#34;,&#xA;                &#34;title&#34; : &#34;D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-34969&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-34969&#34;,&#xA;                &#34;title&#34; : &#34;D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-34969&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=gmp-6.2.0-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=dbus-1.12.20-7.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-34969&#34;,&#xA;                &#34;title&#34; : &#34;D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-34969&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-34969&#34;,&#xA;                &#34;title&#34; : &#34;D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-34969&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libsmartcols@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/util-linux@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27456&#34;,&#xA;                &#34;title&#34; : &#34;util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27456&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3184&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: access control bypass due to improper hostname canonicalization&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3184&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/util-linux-core@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27456&#34;,&#xA;                &#34;title&#34; : &#34;util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27456&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3184&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: access control bypass due to improper hostname canonicalization&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3184&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libfdisk@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/systemd-pam@252-13.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=systemd-252-13.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4598&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4598&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/systemd-rpm-macros@252-13.el9_2?arch=noarch&amp;distro=rhel-9.2&amp;upstream=systemd-252-13.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4598&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4598&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/systemd-libs@252-13.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=systemd-252-13.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4598&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4598&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=2&amp;upstream=shadow-utils-4.9-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-4641&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4641&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56433&#34;,&#xA;                &#34;title&#34; : &#34;shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.6,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56433&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-4641&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4641&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;              &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/apr-util-openssl@1.6.1-20.el9_2.1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=apr-util-1.6.1-20.el9_2.1.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=expat-2.5.0-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28757&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45490&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8176&#34;,&#xA;                &#34;title&#34; : &#34;Libexpat: expat: improper restriction of xml entity expansion depth in libexpat&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45492&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45492&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50602&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59375&#34;,&#xA;                &#34;title&#34; : &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59375&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41080&#34;,&#xA;                &#34;title&#34; : &#34;libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41080&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/apr@1.7.0-11.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=apr-1.7.0-11.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2022-24963&#34;,&#xA;                &#34;title&#34; : &#34;Apache Portable Runtime (APR): out-of-bound writes in the apr_encode family of functions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-24963&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2022-24963&#34;,&#xA;                &#34;title&#34; : &#34;Apache Portable Runtime (APR): out-of-bound writes in the apr_encode family of functions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-24963&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=freetype-2.10.4-9.el9.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2025-27363&#34;,&#xA;              &#34;title&#34; : &#34;An out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are not vulnerable) when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.1,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-27363&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libxml2-2.9.13-3.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49794&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: heap use after free (uaf) leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49794&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49796&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: type confusion leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56171&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56171&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24928&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24928&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7425&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: libxml2: heap use-after-free in libxslt caused by atype corruption in xmlattrptr&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-25062&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-25062&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32415&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32415&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49795&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: null pointer dereference leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6021&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6021&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7424&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: type confusion in xmlnode.psvi between stylesheet and source nodes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7424&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39615&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39615&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6732&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via crafted xsd-validated document&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6732&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9714&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9714&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1757&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: memory leak leading to local denial of service in xmllint interactive shell&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-49043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-49043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28484&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28484&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-29469&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the &#39;\\0&#39; value).&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0990&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via uncontrolled recursion in xml catalog processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32414&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32414&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-26434&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2, there is a possible out of bounds read due to a buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-26434&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0989&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: unbounded relaxng include recursion leading to stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0992&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via crafted xml catalogs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.9,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0992&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6170&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: stack buffer overflow in xmllint interactive shell command handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6170&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-setuptools-53.0.0-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-47273&#34;,&#xA;                &#34;title&#34; : &#34;setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-47273&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/graphite2@1.3.14-9.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=graphite2-1.3.14-9.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2017-5436&#34;,&#xA;                &#34;title&#34; : &#34;An out-of-bounds write in the Graphite 2 library triggered with a maliciously crafted Graphite font. This results in a potentially exploitable crash. This issue was fixed in the Graphite 2 library as well as Mozilla products. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2017-5436&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2017-5436&#34;,&#xA;                &#34;title&#34; : &#34;An out-of-bounds write in the Graphite 2 library triggered with a maliciously crafted Graphite font. This results in a potentially exploitable crash. This issue was fixed in the Graphite 2 library as well as Mozilla products. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2017-5436&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5713&#34;,&#xA;                &#34;title&#34; : &#34;Out-of-bounds read/write during remote profiling and asyncio process introspection when connecting to malicious target&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5713&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13837&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13837&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4224&#34;,&#xA;                &#34;title&#34; : &#34;Stack overflow parsing XML with deeply nested DTD content models&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4224&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3644&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete control character validation in http.cookies&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3644&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12781&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12781&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3446&#34;,&#xA;                &#34;title&#34; : &#34;Base64 decoding stops at first padded quad by default&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15282&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15282&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1502&#34;,&#xA;                &#34;title&#34; : &#34;HTTP client proxy tunnel headers not validated for CR/LF&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1502&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2297&#34;,&#xA;                &#34;title&#34; : &#34;SourcelessFileLoader does not use io.open_code()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2297&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3479&#34;,&#xA;                &#34;title&#34; : &#34;pkgutil.get_data() does not enforce documented restrictions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3479&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13462&#34;,&#xA;                &#34;title&#34; : &#34;tarfile: Skip DIRTYPE normalization during GNU LONGNAME/LONGLINK handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/freetype@2.10.4-9.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=freetype-2.10.4-9.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-27363&#34;,&#xA;                &#34;title&#34; : &#34;An out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are not vulnerable) when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-27363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-23865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-23865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-27363&#34;,&#xA;                &#34;title&#34; : &#34;An out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are not vulnerable) when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-27363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=freetype-2.10.4-9.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-27363&#34;,&#xA;                &#34;title&#34; : &#34;An out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are not vulnerable) when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-27363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-27363&#34;,&#xA;                &#34;title&#34; : &#34;An out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are not vulnerable) when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-27363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libX11-common@1.7.0-7.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=libX11-1.7.0-7.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-43787&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43787&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3138&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in libX11. The security flaw occurs because the functions in src/InitExt.c in libX11 do not check that the values provided for the Request, Event, or Error IDs are within the bounds of the arrays that those functions write to, using those IDs as array indexes. They trust that they were called with values provided by an Xserver adhering to the bounds specified in the X11 protocol, as all X servers provided by X.Org do. As the protocol only specifies a single byte for these values, an out-of-bounds value provided by a malicious server (or a malicious proxy-in-the-middle) can only overwrite other portions of the Display structure and not write outside the bounds of the Display structure itself, possibly causing the client to crash with this memory corruption.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-43785&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43785&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-43786&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-43787&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43787&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libX11@1.7.0-7.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libX11-1.7.0-7.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-43787&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43787&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3138&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in libX11. The security flaw occurs because the functions in src/InitExt.c in libX11 do not check that the values provided for the Request, Event, or Error IDs are within the bounds of the arrays that those functions write to, using those IDs as array indexes. They trust that they were called with values provided by an Xserver adhering to the bounds specified in the X11 protocol, as all X servers provided by X.Org do. As the protocol only specifies a single byte for these values, an out-of-bounds value provided by a malicious server (or a malicious proxy-in-the-middle) can only overwrite other portions of the Display structure and not write outside the bounds of the Display structure itself, possibly causing the client to crash with this memory corruption.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-43785&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43785&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-43786&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-43787&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43787&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glib2-2.68.4-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13601&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in in g_escape_uri_string()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-52533&#34;,&#xA;                &#34;title&#34; : &#34;gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing &#39;\\0&#39; character.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-52533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32611&#34;,&#xA;                &#34;title&#34; : &#34;G_variant_byteswap() can take a long time with some non-normal inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32611&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32665&#34;,&#xA;                &#34;title&#34; : &#34;Gvariant deserialisation does not match spec for non-normal data&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32665&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14512&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in glib gio attribute escaping causes heap buffer overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14512&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-29499&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29499&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14087&#34;,&#xA;                &#34;title&#34; : &#34;Glib: glib: buffer underflow in gvariant parser leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14087&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4373&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4373&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-34397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.8,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-34397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7039&#34;,&#xA;                &#34;title&#34; : &#34;Glib: buffer under-read on glib through glib/gfileutils.c via get_tmp_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7039&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0988&#34;,&#xA;                &#34;title&#34; : &#34;Glib: glib: denial of service via integer overflow in g_buffered_input_stream_peek()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0988&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13601&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in in g_escape_uri_string()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glib2-devel@2.68.4-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glib2-2.68.4-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13601&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in in g_escape_uri_string()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-52533&#34;,&#xA;                &#34;title&#34; : &#34;gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing &#39;\\0&#39; character.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-52533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32611&#34;,&#xA;                &#34;title&#34; : &#34;G_variant_byteswap() can take a long time with some non-normal inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32611&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32665&#34;,&#xA;                &#34;title&#34; : &#34;Gvariant deserialisation does not match spec for non-normal data&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32665&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-29499&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29499&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4373&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4373&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-34397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.8,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-34397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13601&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in in g_escape_uri_string()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=sqlite-3.34.1-6.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-7104&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3277&#34;,&#xA;                &#34;title&#34; : &#34;An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3277&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libpng@1.6.37-12.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=2&amp;upstream=libpng-1.6.37-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-33636&#34;,&#xA;                &#34;title&#34; : &#34;LIBPNG has ARM NEON Palette Expansion Out-of-Bounds Read on AArch64&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-33636&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-33416&#34;,&#xA;                &#34;title&#34; : &#34;LIBPNG has use-after-free via pointer aliasing in `png_set_tRNS` and `png_set_PLTE`&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-33416&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-64720&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-64720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-65018&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-65018&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66293&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66293&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-25646&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-25646&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22801&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22801&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-28162&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-28162&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-64506&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-64506&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22695&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22695&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3713&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3713&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-28164&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-28164&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-64505&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-64505&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-33636&#34;,&#xA;                &#34;title&#34; : &#34;LIBPNG has ARM NEON Palette Expansion Out-of-Bounds Read on AArch64&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-33636&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/brotli-devel@1.0.9-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=brotli-1.0.9-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6176&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6176&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/brotli@1.0.9-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=brotli-1.0.9-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6176&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6176&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=expat-2.5.0-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28757&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45490&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8176&#34;,&#xA;                &#34;title&#34; : &#34;Libexpat: expat: improper restriction of xml entity expansion depth in libexpat&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45492&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45492&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50602&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59375&#34;,&#xA;                &#34;title&#34; : &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59375&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41080&#34;,&#xA;                &#34;title&#34; : &#34;libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41080&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/harfbuzz-devel@2.7.4-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=harfbuzz-2.7.4-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-25193&#34;,&#xA;                &#34;title&#34; : &#34;hb-ot-layout-gsubgpos.hh in HarfBuzz through 6.0.0 allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-25193&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-25193&#34;,&#xA;                &#34;title&#34; : &#34;hb-ot-layout-gsubgpos.hh in HarfBuzz through 6.0.0 allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-25193&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gnutls-3.7.6-20.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-0553&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: incomplete fix for cve-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0553&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0567&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0567&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32988&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls othername san export&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32988&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32990&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls certtool template parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6395&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: null pointer dereference in _gnutls_figure_common_ciphersuite()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5981&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12243&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: gnutls impacted by inefficient der decoding in libtasn1 leading to remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12243&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28834&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28834&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14831&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: gnutls: denial of service via excessive resource consumption during certificate verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14831&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32989&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls sct extension parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28835&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28835&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9820&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: stack-based buffer overflow in gnutls_pkcs11_token_init() function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9820&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-0553&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: incomplete fix for cve-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0553&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libbrotli@1.0.9-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=brotli-1.0.9-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6176&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6176&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/harfbuzz-icu@2.7.4-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=harfbuzz-2.7.4-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-25193&#34;,&#xA;                &#34;title&#34; : &#34;hb-ot-layout-gsubgpos.hh in HarfBuzz through 6.0.0 allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-25193&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-25193&#34;,&#xA;                &#34;title&#34; : &#34;hb-ot-layout-gsubgpos.hh in HarfBuzz through 6.0.0 allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-25193&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/harfbuzz@2.7.4-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=harfbuzz-2.7.4-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-25193&#34;,&#xA;                &#34;title&#34; : &#34;hb-ot-layout-gsubgpos.hh in HarfBuzz through 6.0.0 allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-25193&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22693&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22693&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-25193&#34;,&#xA;                &#34;title&#34; : &#34;hb-ot-layout-gsubgpos.hh in HarfBuzz through 6.0.0 allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-25193&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libpng-devel@1.6.37-12.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=2&amp;upstream=libpng-1.6.37-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-64720&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-64720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-65018&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-65018&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66293&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66293&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-25646&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-25646&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22801&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22801&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22695&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22695&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-64720&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-64720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libicu-devel@67.1-9.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=icu-67.1-9.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-5222&#34;,&#xA;                &#34;title&#34; : &#34;Icu: stack buffer overflow in the srbroot::addtag function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5222&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-5222&#34;,&#xA;                &#34;title&#34; : &#34;Icu: stack buffer overflow in the srbroot::addtag function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5222&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libicu@67.1-9.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=icu-67.1-9.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-5222&#34;,&#xA;                &#34;title&#34; : &#34;Icu: stack buffer overflow in the srbroot::addtag function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5222&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-5222&#34;,&#xA;                &#34;title&#34; : &#34;Icu: stack buffer overflow in the srbroot::addtag function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5222&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/pixman@0.40.0-5.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=pixman-0.40.0-5.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2022-44638&#34;,&#xA;                &#34;title&#34; : &#34;In libpixman in Pixman before 0.42.2, there is an out-of-bounds write (aka heap-based buffer overflow) in rasterize_edges_8 due to an integer overflow in pixman_sample_floor_y.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-44638&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2022-44638&#34;,&#xA;                &#34;title&#34; : &#34;In libpixman in Pixman before 0.42.2, there is an out-of-bounds write (aka heap-based buffer overflow) in rasterize_edges_8 due to an integer overflow in pixman_sample_floor_y.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-44638&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libmount-devel@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27456&#34;,&#xA;                &#34;title&#34; : &#34;util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27456&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3184&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: access control bypass due to improper hostname canonicalization&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3184&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libblkid-devel@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-pip-21.2.3-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-devel@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-devel@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=krb5-1.20.1-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39975&#34;,&#xA;                &#34;title&#34; : &#34;kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26462&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37370&#34;,&#xA;                &#34;title&#34; : &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37370&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-36054&#34;,&#xA;                &#34;title&#34; : &#34;lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-36054&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37371&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37371&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24528&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24528&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26458&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26461&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26461&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3576&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3576&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=curl-7.76.1-23.el9_2.1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2398&#34;,&#xA;                &#34;title&#34; : &#34;HTTP/2 push headers memory-leak&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2398&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27536&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists libcurl &lt;8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27536&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28321&#34;,&#xA;                &#34;title&#34; : &#34;An improper certificate validation vulnerability exists in curl &lt;v8.1.0 in the way it supports matching of wildcard patterns when listed as \&#34;Subject Alternative Name\&#34; in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28321&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27538&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27538&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-46218&#34;,&#xA;                &#34;title&#34; : &#34;This flaw allows a malicious HTTP server to set \&#34;super cookies\&#34; in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl&#39;s function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-46218&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9086&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9086&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27533&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability in input validation exists in curl &lt;8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \&#34;telnet options\&#34; during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application&#39;s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27534&#34;,&#xA;                &#34;title&#34; : &#34;A path traversal vulnerability exists in curl &lt;8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27534&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28322&#34;,&#xA;                &#34;title&#34; : &#34;An information disclosure vulnerability exists in curl &lt;v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28322&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38546&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38546&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=nghttp2-1.43.0-5.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27135&#34;,&#xA;                &#34;title&#34; : &#34;nghttp2 Denial of service: Assertion failure due to the missing state validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27135&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28182&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28182&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=gmp-6.2.0-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=virt-what-1.25-3.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28390&#34;,&#xA;                &#34;title&#34; : &#34;Possible NULL Dereference When Processing CMS KeyTransportRecipientInfo&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28390&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9231&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9231&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28388&#34;,&#xA;                &#34;title&#34; : &#34;NULL Pointer Dereference When Processing a Delta CRL&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28388&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28389&#34;,&#xA;                &#34;title&#34; : &#34;Possible NULL Dereference When Processing CMS KeyAgreeRecipientInfo&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28389&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-31790&#34;,&#xA;                &#34;title&#34; : &#34;Incorrect Failure Handling in RSA KEM RSASVE Encapsulation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-31790&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-31789&#34;,&#xA;                &#34;title&#34; : &#34;Heap Buffer Overflow in Hexadecimal Conversion&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-31789&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28386&#34;,&#xA;                &#34;title&#34; : &#34;Out-of-bounds Read in AES-CFB-128 on X86-64 with AVX-512 Support&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28386&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28387&#34;,&#xA;                &#34;title&#34; : &#34;Potential Use-after-free in DANE Client Code&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28387&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.1,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2673&#34;,&#xA;                &#34;title&#34; : &#34;OpenSSL TLS 1.3 server may choose unexpected key agreement group&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.1,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2673&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/pam@1.5.1-14.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=pam-1.5.1-14.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6020&#34;,&#xA;                &#34;title&#34; : &#34;Linux-pam: linux-pam directory traversal&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6020&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8941&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8941&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-10963&#34;,&#xA;                &#34;title&#34; : &#34;Pam: improper hostname interpretation in pam_access leads to access control bypass&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-10963&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-22365&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-22365&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-10041&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-10041&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6020&#34;,&#xA;                &#34;title&#34; : &#34;Linux-pam: linux-pam directory traversal&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6020&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libgcrypt-1.10.0-10.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2236&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2236&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41990&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 mishandles Dilithium signing. Writes to a static array lack a bounds check but do not use attacker-controlled data.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/dmidecode@3.3-7.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=dmidecode-3.3-7.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-30630&#34;,&#xA;                &#34;title&#34; : &#34;Dmidecode before 3.5 allows -dump-bin to overwrite a local file. This has security relevance because, for example, execution of Dmidecode via Sudo is plausible. NOTE: Some third parties have indicated the fix in 3.5 does not adequately address the vulnerability. The argument is that the proposed patch prevents dmidecode from writing to an existing file. However, there are multiple attack vectors that would not require overwriting an existing file that would provide the same level of unauthorized privilege escalation (e.g. creating a new file in /etc/cron.hourly).&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-30630&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-30630&#34;,&#xA;                &#34;title&#34; : &#34;Dmidecode before 3.5 allows -dump-bin to overwrite a local file. This has security relevance because, for example, execution of Dmidecode via Sudo is plausible. NOTE: Some third parties have indicated the fix in 3.5 does not adequately address the vulnerability. The argument is that the proposed patch prevents dmidecode from writing to an existing file. However, there are multiple attack vectors that would not require overwriting an existing file that would provide the same level of unauthorized privilege escalation (e.g. creating a new file in /etc/cron.hourly).&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-30630&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libeconf@0.4.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libeconf-0.4.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-22652&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in \&#34;read_file\&#34; function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-22652&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-22652&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in \&#34;read_file\&#34; function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-22652&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27456&#34;,&#xA;                &#34;title&#34; : &#34;util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27456&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3184&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: access control bypass due to improper hostname canonicalization&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3184&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libsmartcols@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/util-linux@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27456&#34;,&#xA;                &#34;title&#34; : &#34;util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27456&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3184&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: access control bypass due to improper hostname canonicalization&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3184&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libfdisk@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/util-linux-core@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/systemd-libs@252-13.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=systemd-252-13.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4598&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4598&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=2&amp;upstream=shadow-utils-4.9-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-4641&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4641&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56433&#34;,&#xA;                &#34;title&#34; : &#34;shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.6,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56433&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-4641&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4641&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=httpd-2.4.53-11.el9_2.5.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;              &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-38475&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.1,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-38475&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-38476&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.1,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-38476&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-27522&#34;,&#xA;              &#34;title&#34; : &#34;Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-27522&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-31122&#34;,&#xA;              &#34;title&#34; : &#34;Apache HTTP Server: mod_macro buffer over-read&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-31122&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-38477&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-38477&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-47252&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-47252&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-23048&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-23048&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-49812&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-49812&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-39573&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.4,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-39573&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-58098&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.1,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-58098&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-38709&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.8,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-38709&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-65082&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-65082&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-66200&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.4,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-66200&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-38473&#34;,&#xA;              &#34;title&#34; : &#34;Apache HTTP Server proxy encoding problem&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-38473&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-24795&#34;,&#xA;              &#34;title&#34; : &#34;Apache HTTP Server: HTTP Response Splitting in multiple modules&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 4.0,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-24795&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.5?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=httpd-2.4.53-11.el9_2.5.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38475&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38475&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38476&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38476&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27522&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27522&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-31122&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_macro buffer over-read&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31122&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38477&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38477&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-47252&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-47252&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-23048&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-23048&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49812&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49812&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-39573&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-39573&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-58098&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-58098&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38709&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38709&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-65082&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-65082&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66200&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66200&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38473&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server proxy encoding problem&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38473&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-24795&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: HTTP Response Splitting in multiple modules&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-24795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.5?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=httpd-2.4.53-11.el9_2.5.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38475&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38475&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38476&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38476&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27522&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27522&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-31122&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_macro buffer over-read&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31122&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38477&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38477&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-47252&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-47252&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-23048&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-23048&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49812&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49812&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-39573&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-39573&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-58098&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-58098&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38709&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38709&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-65082&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-65082&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66200&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66200&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38473&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server proxy encoding problem&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38473&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-24795&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: HTTP Response Splitting in multiple modules&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-24795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/httpd-filesystem@2.4.53-11.el9_2.5?arch=noarch&amp;distro=rhel-9.2&amp;upstream=httpd-2.4.53-11.el9_2.5.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38475&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38475&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38476&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38476&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27522&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27522&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-31122&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_macro buffer over-read&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31122&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38477&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38477&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-47252&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-47252&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-23048&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-23048&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49812&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49812&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59775&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59775&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-39573&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-39573&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-58098&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-58098&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38709&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38709&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-65082&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-65082&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66200&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66200&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38473&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server proxy encoding problem&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38473&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-24795&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: HTTP Response Splitting in multiple modules&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-24795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=krb5-1.20.1-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39975&#34;,&#xA;                &#34;title&#34; : &#34;kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26462&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37370&#34;,&#xA;                &#34;title&#34; : &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37370&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-36054&#34;,&#xA;                &#34;title&#34; : &#34;lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-36054&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37371&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37371&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24528&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24528&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26458&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26461&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26461&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3576&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3576&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=expat-2.5.0-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28757&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45490&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8176&#34;,&#xA;                &#34;title&#34; : &#34;Libexpat: expat: improper restriction of xml entity expansion depth in libexpat&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45492&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45492&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50602&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59375&#34;,&#xA;                &#34;title&#34; : &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59375&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41080&#34;,&#xA;                &#34;title&#34; : &#34;libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41080&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openldap@2.6.2-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=openldap-2.6.2-3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/apr@1.7.0-11.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=apr-1.7.0-11.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2022-24963&#34;,&#xA;                &#34;title&#34; : &#34;Apache Portable Runtime (APR): out-of-bound writes in the apr_encode family of functions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-24963&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2022-24963&#34;,&#xA;                &#34;title&#34; : &#34;Apache Portable Runtime (APR): out-of-bound writes in the apr_encode family of functions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-24963&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=gmp-6.2.0-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=2&amp;upstream=shadow-utils-4.9-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-4641&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4641&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56433&#34;,&#xA;                &#34;title&#34; : &#34;shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.6,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56433&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-4641&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4641&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;              &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=binutils-2.35.2-37.el9.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2022-4285&#34;,&#xA;              &#34;title&#34; : &#34;An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a denial of service. This issue is the result of an incomplete fix for CVE-2020-16599.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2022-4285&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-11082&#34;,&#xA;              &#34;title&#34; : &#34;GNU Binutils Linker elf-eh-frame.c _bfd_elf_parse_eh_frame heap-based overflow&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-11082&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-11083&#34;,&#xA;              &#34;title&#34; : &#34;GNU Binutils Linker elfcode.h elf_swap_shdr heap-based overflow&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-11083&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-5244&#34;,&#xA;              &#34;title&#34; : &#34;GNU Binutils ld elflink.c elf_gc_sweep memory corruption&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 4.0,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-5244&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=krb5-1.20.1-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39975&#34;,&#xA;                &#34;title&#34; : &#34;kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26462&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37370&#34;,&#xA;                &#34;title&#34; : &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37370&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-36054&#34;,&#xA;                &#34;title&#34; : &#34;lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-36054&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37371&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37371&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24528&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24528&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26458&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26461&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26461&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3576&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3576&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=curl-7.76.1-23.el9_2.1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2398&#34;,&#xA;                &#34;title&#34; : &#34;HTTP/2 push headers memory-leak&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2398&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27536&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists libcurl &lt;8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27536&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28321&#34;,&#xA;                &#34;title&#34; : &#34;An improper certificate validation vulnerability exists in curl &lt;v8.1.0 in the way it supports matching of wildcard patterns when listed as \&#34;Subject Alternative Name\&#34; in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28321&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27538&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27538&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-46218&#34;,&#xA;                &#34;title&#34; : &#34;This flaw allows a malicious HTTP server to set \&#34;super cookies\&#34; in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl&#39;s function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-46218&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9086&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9086&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27533&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability in input validation exists in curl &lt;8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \&#34;telnet options\&#34; during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application&#39;s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27534&#34;,&#xA;                &#34;title&#34; : &#34;A path traversal vulnerability exists in curl &lt;8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27534&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28322&#34;,&#xA;                &#34;title&#34; : &#34;An information disclosure vulnerability exists in curl &lt;v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28322&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38546&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38546&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=nghttp2-1.43.0-5.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27135&#34;,&#xA;                &#34;title&#34; : &#34;nghttp2 Denial of service: Assertion failure due to the missing state validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27135&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28182&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28182&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=gmp-6.2.0-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=binutils-2.35.2-37.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2022-4285&#34;,&#xA;                &#34;title&#34; : &#34;An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a denial of service. This issue is the result of an incomplete fix for CVE-2020-16599.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-4285&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11082&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elf-eh-frame.c _bfd_elf_parse_eh_frame heap-based overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11082&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11083&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elfcode.h elf_swap_shdr heap-based overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11083&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5244&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils ld elflink.c elf_gc_sweep memory corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5244&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2022-4285&#34;,&#xA;                &#34;title&#34; : &#34;An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a denial of service. This issue is the result of an incomplete fix for CVE-2020-16599.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-4285&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/binutils@2.35.2-37.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=binutils-2.35.2-37.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2022-4285&#34;,&#xA;                &#34;title&#34; : &#34;An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a denial of service. This issue is the result of an incomplete fix for CVE-2020-16599.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-4285&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11081&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils objdump.c dump_dwarf_section out-of-bounds&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11081&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11082&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elf-eh-frame.c _bfd_elf_parse_eh_frame heap-based overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11082&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11083&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elfcode.h elf_swap_shdr heap-based overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11083&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11413&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elflink.c elf_link_add_object_symbols out-of-bounds&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11413&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5244&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils ld elflink.c elf_gc_sweep memory corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5244&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11412&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elflink.c bfd_elf_gc_record_vtentry out-of-bounds&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11412&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11414&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elflink.c get_link_hash_entry out-of-bounds&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11414&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11494&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elfxx-x86.c _bfd_x86_elf_late_size_sections out-of-bounds&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11494&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11495&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elf64-x86-64.c elf_x86_64_relocate_section heap-based overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11495&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11839&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils prdbg.c tg_tag_type return value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11839&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11840&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils ldmisc.c vfinfo out-of-bounds&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11840&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66861&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66862&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66862&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66863&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66863&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66864&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66864&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66866&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66866&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69647&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69647&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69648&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69648&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69649&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69649&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69650&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils thru 2.46 readelf contains a double free vulnerability when processing a crafted ELF binary with malformed relocation data. During GOT relocation handling, dump_relocations may return early without initializing the all_relocations array. As a result, process_got_section_contents() may pass an uninitialized r_symbol pointer to free(), leading to a double free and terminating the program with SIGABRT. No evidence of exploitable memory corruption or code execution was observed; the impact is limited to denial of service. NOTE: this is disputed by third parties because the observed behavior occurred only in pre-release code and did not affect any tagged version.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69652&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69652&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69645&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.8,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69645&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69646&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.8,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69646&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69651&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils thru 2.46 readelf contains a vulnerability that leads to an invalid pointer free when processing a crafted ELF binary with malformed relocation or symbol data. If dump_relocations returns early due to parsing errors, the internal all_relocations array may remain partially uninitialized. Later, process_got_section_contents() may attempt to free an invalid r_symbol pointer, triggering memory corruption checks in glibc and causing the program to terminate with SIGABRT. No evidence of further memory corruption or code execution was observed; the impact is limited to denial of service. NOTE: this is disputed by third parties because the observed behavior occurred only in pre-release code and did not affect any tagged version.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.8,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69651&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2022-4285&#34;,&#xA;                &#34;title&#34; : &#34;An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a denial of service. This issue is the result of an incomplete fix for CVE-2020-16599.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-4285&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-setuptools-53.0.0-12.el9.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-47273&#34;,&#xA;              &#34;title&#34; : &#34;setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.1,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-47273&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-setuptools-53.0.0-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-47273&#34;,&#xA;                &#34;title&#34; : &#34;setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-47273&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5713&#34;,&#xA;                &#34;title&#34; : &#34;Out-of-bounds read/write during remote profiling and asyncio process introspection when connecting to malicious target&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5713&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13837&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13837&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4224&#34;,&#xA;                &#34;title&#34; : &#34;Stack overflow parsing XML with deeply nested DTD content models&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4224&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3644&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete control character validation in http.cookies&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3644&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12781&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12781&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3446&#34;,&#xA;                &#34;title&#34; : &#34;Base64 decoding stops at first padded quad by default&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15282&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15282&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1502&#34;,&#xA;                &#34;title&#34; : &#34;HTTP client proxy tunnel headers not validated for CR/LF&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1502&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2297&#34;,&#xA;                &#34;title&#34; : &#34;SourcelessFileLoader does not use io.open_code()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2297&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3479&#34;,&#xA;                &#34;title&#34; : &#34;pkgutil.get_data() does not enforce documented restrictions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3479&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13462&#34;,&#xA;                &#34;title&#34; : &#34;tarfile: Skip DIRTYPE normalization during GNU LONGNAME/LONGLINK handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=sqlite-3.34.1-6.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-7104&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3277&#34;,&#xA;                &#34;title&#34; : &#34;An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3277&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=expat-2.5.0-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28757&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45490&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8176&#34;,&#xA;                &#34;title&#34; : &#34;Libexpat: expat: improper restriction of xml entity expansion depth in libexpat&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45492&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45492&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50602&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59375&#34;,&#xA;                &#34;title&#34; : &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59375&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41080&#34;,&#xA;                &#34;title&#34; : &#34;libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41080&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-pip-21.2.3-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=cmake-3.20.2-8.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libxml2-2.9.13-3.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49794&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: heap use after free (uaf) leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49794&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49796&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: type confusion leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56171&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56171&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24928&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24928&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7425&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: libxml2: heap use-after-free in libxslt caused by atype corruption in xmlattrptr&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-25062&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-25062&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32415&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32415&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49795&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: null pointer dereference leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6021&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6021&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7424&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: type confusion in xmlnode.psvi between stylesheet and source nodes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7424&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39615&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39615&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6732&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via crafted xsd-validated document&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6732&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9714&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9714&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1757&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: memory leak leading to local denial of service in xmllint interactive shell&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-49043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-49043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28484&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28484&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-29469&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the &#39;\\0&#39; value).&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0990&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via uncontrolled recursion in xml catalog processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32414&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32414&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-26434&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2, there is a possible out of bounds read due to a buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-26434&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0989&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: unbounded relaxng include recursion leading to stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0992&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via crafted xml catalogs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.9,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0992&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6170&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: stack buffer overflow in xmllint interactive shell command handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6170&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=krb5-1.20.1-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39975&#34;,&#xA;                &#34;title&#34; : &#34;kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26462&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37370&#34;,&#xA;                &#34;title&#34; : &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37370&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-36054&#34;,&#xA;                &#34;title&#34; : &#34;lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-36054&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37371&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37371&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24528&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24528&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26458&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26461&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26461&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3576&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3576&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-setuptools-53.0.0-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-47273&#34;,&#xA;                &#34;title&#34; : &#34;setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-47273&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5713&#34;,&#xA;                &#34;title&#34; : &#34;Out-of-bounds read/write during remote profiling and asyncio process introspection when connecting to malicious target&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5713&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13837&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13837&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4224&#34;,&#xA;                &#34;title&#34; : &#34;Stack overflow parsing XML with deeply nested DTD content models&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4224&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3644&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete control character validation in http.cookies&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3644&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12781&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12781&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3446&#34;,&#xA;                &#34;title&#34; : &#34;Base64 decoding stops at first padded quad by default&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15282&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15282&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1502&#34;,&#xA;                &#34;title&#34; : &#34;HTTP client proxy tunnel headers not validated for CR/LF&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1502&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2297&#34;,&#xA;                &#34;title&#34; : &#34;SourcelessFileLoader does not use io.open_code()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2297&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3479&#34;,&#xA;                &#34;title&#34; : &#34;pkgutil.get_data() does not enforce documented restrictions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3479&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13462&#34;,&#xA;                &#34;title&#34; : &#34;tarfile: Skip DIRTYPE normalization during GNU LONGNAME/LONGLINK handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=curl-7.76.1-23.el9_2.1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2398&#34;,&#xA;                &#34;title&#34; : &#34;HTTP/2 push headers memory-leak&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2398&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27536&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists libcurl &lt;8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27536&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28321&#34;,&#xA;                &#34;title&#34; : &#34;An improper certificate validation vulnerability exists in curl &lt;v8.1.0 in the way it supports matching of wildcard patterns when listed as \&#34;Subject Alternative Name\&#34; in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28321&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27538&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27538&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-46218&#34;,&#xA;                &#34;title&#34; : &#34;This flaw allows a malicious HTTP server to set \&#34;super cookies\&#34; in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl&#39;s function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-46218&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9086&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9086&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27533&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability in input validation exists in curl &lt;8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \&#34;telnet options\&#34; during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application&#39;s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27534&#34;,&#xA;                &#34;title&#34; : &#34;A path traversal vulnerability exists in curl &lt;8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27534&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28322&#34;,&#xA;                &#34;title&#34; : &#34;An information disclosure vulnerability exists in curl &lt;v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28322&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38546&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38546&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=curl-7.76.1-23.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2398&#34;,&#xA;                &#34;title&#34; : &#34;HTTP/2 push headers memory-leak&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2398&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27535&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl &lt;8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27536&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists libcurl &lt;8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27536&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28321&#34;,&#xA;                &#34;title&#34; : &#34;An improper certificate validation vulnerability exists in curl &lt;v8.1.0 in the way it supports matching of wildcard patterns when listed as \&#34;Subject Alternative Name\&#34; in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28321&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27538&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27538&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-46218&#34;,&#xA;                &#34;title&#34; : &#34;This flaw allows a malicious HTTP server to set \&#34;super cookies\&#34; in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl&#39;s function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-46218&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9086&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9086&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27533&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability in input validation exists in curl &lt;8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \&#34;telnet options\&#34; during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application&#39;s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27534&#34;,&#xA;                &#34;title&#34; : &#34;A path traversal vulnerability exists in curl &lt;8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27534&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28322&#34;,&#xA;                &#34;title&#34; : &#34;An information disclosure vulnerability exists in curl &lt;v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28322&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38546&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38546&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libarchive-3.5.3-4.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-5914&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5914&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4111&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: infinite loop denial of service in rar5 decompression via archive_read_data() in libarchive&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4111&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4424&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: libarchive: information disclosure via heap out-of-bounds read in rar archive processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4424&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5121&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: libarchive: arbitrary code execution via integer overflow in iso9660 image processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5121&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-60753&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-60753&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-57970&#34;,&#xA;                &#34;title&#34; : &#34;libarchive through 3.7.7 has a heap-based buffer over-read in header_gnu_longlink in archive_read_support_format_tar.c via a TAR archive because it mishandles truncation in the middle of a GNU long linkname.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-57970&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-25724&#34;,&#xA;                &#34;title&#34; : &#34;list_item_verbose in tar/util.c in libarchive through 3.7.7 does not check an strftime return value, which can lead to a denial of service or unspecified other impact via a crafted TAR archive that is read with a verbose value of 2. For example, the 100-byte buffer may not be sufficient for a custom locale.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-25724&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-5914&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5914&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=sqlite-3.34.1-6.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-7104&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3277&#34;,&#xA;                &#34;title&#34; : &#34;An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3277&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=nghttp2-1.43.0-5.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27135&#34;,&#xA;                &#34;title&#34; : &#34;nghttp2 Denial of service: Assertion failure due to the missing state validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27135&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28182&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28182&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=expat-2.5.0-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28757&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45490&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8176&#34;,&#xA;                &#34;title&#34; : &#34;Libexpat: expat: improper restriction of xml entity expansion depth in libexpat&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45492&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45492&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50602&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59375&#34;,&#xA;                &#34;title&#34; : &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59375&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41080&#34;,&#xA;                &#34;title&#34; : &#34;libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41080&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/rpm@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=gmp-6.2.0-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-pip-21.2.3-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;              &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.1,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=krb5-1.20.1-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39975&#34;,&#xA;                &#34;title&#34; : &#34;kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26462&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37370&#34;,&#xA;                &#34;title&#34; : &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37370&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-36054&#34;,&#xA;                &#34;title&#34; : &#34;lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-36054&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37371&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37371&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24528&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24528&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26458&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26461&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26461&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3576&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3576&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-devel@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-headers@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/kernel-headers@5.14.0-284.11.1.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=kernel-5.14.0-284.11.1.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-44466&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in net/ceph/messenger_v2.c in the Linux kernel before 6.4.5. There is an integer signedness error, leading to a buffer overflow and remote code execution via HELLO or one of the AUTH frames. This occurs because of an untrusted length taken from a TCP packet in ceph_decode_32.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5154&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5154&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21927&#34;,&#xA;                &#34;title&#34; : &#34;nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21927&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1652&#34;,&#xA;                &#34;title&#34; : &#34;A use-after-free flaw was found in nfsd4_ssc_setup_dul in fs/nfsd/nfs4proc.c in the NFS filesystem in the Linux Kernel. This issue could allow a local attacker to crash the system or it may lead to a kernel information leak problem.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1652&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-52922&#34;,&#xA;                &#34;title&#34; : &#34;can: bcm: Fix UAF in bcm_proc_show()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52922&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-36971&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-36971&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21756&#34;,&#xA;                &#34;title&#34; : &#34;vsock: Keep the binding until socket destruction&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21756&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22020&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22020&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38052&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38052&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38087&#34;,&#xA;                &#34;title&#34; : &#34;net/sched: fix use-after-free in taprio_dev_notifier&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38087&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-41723&#34;,&#xA;                &#34;title&#34; : &#34;Denial of service via crafted HTTP/2 stream in net/http and golang.org/x/net&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-41723&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38471&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38471&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-42284&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-42284&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-53104&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-53104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-37750&#34;,&#xA;                &#34;title&#34; : &#34;smb: client: fix UAF in decryption with multichannel&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-37750&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38250&#34;,&#xA;                &#34;title&#34; : &#34;Bluetooth: hci_core: Fix use-after-free in vhci_flush()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38250&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-49846&#34;,&#xA;                &#34;title&#34; : &#34;udf: Fix a slab-out-of-bounds write bug in udf_find_entry()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-49846&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-52933&#34;,&#xA;                &#34;title&#34; : &#34;Squashfs: fix handling and sanity checking of xattr_ids count&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52933&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-53751&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-53751&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6606&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6606&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6610&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6610&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-35937&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38538&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38538&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-53150&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-53150&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-57947&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-57947&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21887&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21887&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21893&#34;,&#xA;                &#34;title&#34; : &#34;keys: Fix UAF in key_put()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21893&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21920&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21969&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21969&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21979&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21979&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21993&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21993&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21997&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21997&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22026&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22026&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22055&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22055&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22104&#34;,&#xA;                &#34;title&#34; : &#34;ibmvnic: Use kernel helpers for hex dumps&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22113&#34;,&#xA;                &#34;title&#34; : &#34;ext4: avoid journaling sb update on error if journal is destroying&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22113&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22121&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22121&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-37738&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-37738&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-37799&#34;,&#xA;                &#34;title&#34; : &#34;vmxnet3: Fix malformed packet sizing in vmxnet3_process_xdp&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-37799&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38264&#34;,&#xA;                &#34;title&#34; : &#34;nvme-tcp: sanitize request list handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38264&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-49977&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-49977&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-50066&#34;,&#xA;                &#34;title&#34; : &#34;net: atlantic: fix aq_vec index out of range error&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-50066&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-53047&#34;,&#xA;                &#34;title&#34; : &#34;tee: amdtee: fix race condition in amdtee_open_session&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-53047&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-53107&#34;,&#xA;                &#34;title&#34; : &#34;veth: Fix use after free in XDP_REDIRECT&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-53107&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6932&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in Linux kernel&#39;s ipv4: igmp component&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6932&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0646&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0646&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-46858&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-46858&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50154&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50154&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-53141&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-53141&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21764&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21764&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21867&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21867&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21919&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21919&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21926&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21926&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21966&#34;,&#xA;                &#34;title&#34; : &#34;dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21966&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22004&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22004&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22126&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22126&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-37797&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-37797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-37803&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-37803&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-37890&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-37890&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-37914&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-37914&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-37943&#34;,&#xA;                &#34;title&#34; : &#34;wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-37943&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38079&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38079&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38086&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38086&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38124&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38124&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38177&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38177&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38200&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38200&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38332&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38332&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-50616&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-50616&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56614&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56614&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56615&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56615&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21883&#34;,&#xA;                &#34;title&#34; : &#34;ice: Fix deinitializing VF in error path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21883&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21928&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21928&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21929&#34;,&#xA;                &#34;title&#34; : &#34;HID: intel-ish-hid: Fix use-after-free issue in hid_ishtp_cl_remove()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21929&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21991&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21991&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22085&#34;,&#xA;                &#34;title&#34; : &#34;RDMA/core: Fix use-after-free when rename device name&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22085&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-47383&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-47383&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21759&#34;,&#xA;                &#34;title&#34; : &#34;ipv6: mcast: extend RCU protection in igmp6_send()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21759&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28746&#34;,&#xA;                &#34;title&#34; : &#34;Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28746&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6356&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6356&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6536&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6536&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-21823&#34;,&#xA;                &#34;title&#34; : &#34;Hardware logic with insecure de-synchronization in Intel(R) DSA and Intel(R) IAA for some Intel(R) 4th or 5th generation Xeon(R) processors may allow an authorized user to potentially enable escalation of privilege local access&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-21823&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21999&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21999&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38350&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38350&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-46695&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-46695&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50275&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50275&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-42292&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-42292&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50302&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50302&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-49395&#34;,&#xA;                &#34;title&#34; : &#34;um: Fix out-of-bounds read in LDT setup&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-49395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5090&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5090&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26664&#34;,&#xA;                &#34;title&#34; : &#34;hwmon: (coretemp) Fix out-of-bounds memory access&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26664&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50264&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50264&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38110&#34;,&#xA;                &#34;title&#34; : &#34;net/mdiobus: Fix potential out-of-bounds clause 45 read/write access&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38110&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-53122&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-53122&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-53197&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-53197&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-36941&#34;,&#xA;                &#34;title&#34; : &#34;wifi: nl80211: don&#39;t free NULL coalescing rule&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-36941&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38627&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38627&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-50042&#34;,&#xA;                &#34;title&#34; : &#34;net: genl: fix error path memory leak in policy dumping&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-50042&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1074&#34;,&#xA;                &#34;title&#34; : &#34;A memory leak flaw was found in the Linux kernel&#39;s Stream Control Transmission Protocol. This issue may occur when a user starts a malicious networking service and someone connects to this service. This could allow a local user to starve resources, causing a denial of service.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1074&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-45862&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in drivers/usb/storage/ene_ub6250.c for the ENE UB6250 reader driver in the Linux kernel before 6.2.5. An object could potentially extend beyond the end of an allocation.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-45862&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-52490&#34;,&#xA;                &#34;title&#34; : &#34;mm: migrate: fix getting incorrect page mapping during page migration&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-52658&#34;,&#xA;                &#34;title&#34; : &#34;Revert \&#34;net/mlx5: Block entering switchdev mode with ns inconsistency\&#34;&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52658&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-53597&#34;,&#xA;                &#34;title&#34; : &#34;cifs: fix mid leak during reconnection after timeout threshold&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-53597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-53704&#34;,&#xA;                &#34;title&#34; : &#34;clk: imx: clk-imx8mp: improve error handling in imx8mp_clocks_probe()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-53704&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-54004&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-54004&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-54093&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-54093&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-54271&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-54271&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-7192&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7192&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0443&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0443&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26615&#34;,&#xA;                &#34;title&#34; : &#34;net/smc: fix illegal rmb_desc access in SMC-D connection dump&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26615&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26878&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-27046&#34;,&#xA;                &#34;title&#34; : &#34;nfp: flower: handle acti_netdevs allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-27046&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-27052&#34;,&#xA;                &#34;title&#34; : &#34;wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-27052&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-35789&#34;,&#xA;                &#34;title&#34; : &#34;wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-35789&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-35852&#34;,&#xA;                &#34;title&#34; : &#34;mlxsw: spectrum_acl_tcam: Fix memory leak when canceling rehash work&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-35852&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-35890&#34;,&#xA;                &#34;title&#34; : &#34;gro: fix ownership transfer&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-35890&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-35907&#34;,&#xA;                &#34;title&#34; : &#34;mlxbf_gige: call request_irq() after NAPI initialized&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-35907&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-35952&#34;,&#xA;                &#34;title&#34; : &#34;drm/ast: Fix soft lockup&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-35952&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-35989&#34;,&#xA;                &#34;title&#34; : &#34;dmaengine: idxd: Fix oops during rmmod on single-CPU platforms&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-35989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-39483&#34;,&#xA;                &#34;title&#34; : &#34;KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright masked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-39483&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-40959&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40959&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-41035&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-41035&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-41064&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-41064&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-42079&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-42079&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-42272&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-42272&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-42283&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-42283&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-42322&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-42322&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-43854&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-43854&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-44990&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-44990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-44994&#34;,&#xA;                &#34;title&#34; : &#34;iommu: Restore lost return in iommu_report_device_fault()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-44994&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45018&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45018&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-46713&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-46713&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-46824&#34;,&#xA;                &#34;title&#34; : &#34;iommufd: Require drivers to supply the cache_invalidate_user ops&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-46824&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-49949&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-49949&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50208&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50208&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50251&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50251&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50252&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50252&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-53113&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-53113&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21669&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21669&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21962&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21962&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21963&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21963&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21964&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21964&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-37785&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-37785&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38234&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38234&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-52448&#34;,&#xA;                &#34;title&#34; : &#34;gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52448&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-53755&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-53755&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-47745&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-47745&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-53088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-53088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21961&#34;,&#xA;                &#34;title&#34; : &#34;eth: bnxt: fix truesize for mb-xdp-pass case&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22036&#34;,&#xA;                &#34;title&#34; : &#34;exfat: fix random stack corruption after get_block&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22036&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38417&#34;,&#xA;                &#34;title&#34; : &#34;ice: fix eswitch code memory leak in reset scenario&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38417&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-52771&#34;,&#xA;                &#34;title&#34; : &#34;cxl/port: Fix delete_endpoint() vs parent unregistration race&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52771&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-52864&#34;,&#xA;                &#34;title&#34; : &#34;platform/x86: wmi: Fix opening of char device&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52864&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26855&#34;,&#xA;                &#34;title&#34; : &#34;net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26855&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-35845&#34;,&#xA;                &#34;title&#34; : &#34;wifi: iwlwifi: dbg-tlv: ensure NUL termination&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-35845&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-36922&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-36922&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38555&#34;,&#xA;                &#34;title&#34; : &#34;net/mlx5: Discard command completions in internal error&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38555&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38556&#34;,&#xA;                &#34;title&#34; : &#34;net/mlx5: Add a timeout to acquire the command queue semaphore&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38556&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-43855&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-43855&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-46826&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-46826&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26897&#34;,&#xA;                &#34;title&#34; : &#34;wifi: ath9k: delay all of ath9k_wmi_event_tasklet() until init is complete&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26897&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38586&#34;,&#xA;                &#34;title&#34; : &#34;r8169: Fix possible ring buffer corruption on fragmented Tx packets.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38586&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-50846&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-50846&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-53639&#34;,&#xA;                &#34;title&#34; : &#34;wifi: ath6kl: reduce WARN to dev_dbg() in callback&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-53639&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-54153&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-54153&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-54267&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-54267&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-44466&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in net/ceph/messenger_v2.c in the Linux kernel before 6.4.5. There is an integer signedness error, leading to a buffer overflow and remote code execution via HELLO or one of the AUTH frames. This occurs because of an untrusted length taken from a TCP packet in ceph_decode_32.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=curl-7.76.1-23.el9_2.1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2398&#34;,&#xA;                &#34;title&#34; : &#34;HTTP/2 push headers memory-leak&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2398&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27536&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists libcurl &lt;8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27536&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28321&#34;,&#xA;                &#34;title&#34; : &#34;An improper certificate validation vulnerability exists in curl &lt;v8.1.0 in the way it supports matching of wildcard patterns when listed as \&#34;Subject Alternative Name\&#34; in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28321&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27538&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27538&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-46218&#34;,&#xA;                &#34;title&#34; : &#34;This flaw allows a malicious HTTP server to set \&#34;super cookies\&#34; in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl&#39;s function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-46218&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9086&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9086&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27533&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability in input validation exists in curl &lt;8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \&#34;telnet options\&#34; during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application&#39;s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27534&#34;,&#xA;                &#34;title&#34; : &#34;A path traversal vulnerability exists in curl &lt;8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27534&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28322&#34;,&#xA;                &#34;title&#34; : &#34;An information disclosure vulnerability exists in curl &lt;v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28322&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38546&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38546&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=nghttp2-1.43.0-5.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27135&#34;,&#xA;                &#34;title&#34; : &#34;nghttp2 Denial of service: Assertion failure due to the missing state validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27135&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28182&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28182&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=gmp-6.2.0-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/cpp@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgomp@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=binutils-2.35.2-37.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2022-4285&#34;,&#xA;                &#34;title&#34; : &#34;An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a denial of service. This issue is the result of an incomplete fix for CVE-2020-16599.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-4285&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11082&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elf-eh-frame.c _bfd_elf_parse_eh_frame heap-based overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11082&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11083&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elfcode.h elf_swap_shdr heap-based overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11083&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5244&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils ld elflink.c elf_gc_sweep memory corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5244&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2022-4285&#34;,&#xA;                &#34;title&#34; : &#34;An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a denial of service. This issue is the result of an incomplete fix for CVE-2020-16599.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-4285&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/binutils@2.35.2-37.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=binutils-2.35.2-37.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2022-4285&#34;,&#xA;                &#34;title&#34; : &#34;An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a denial of service. This issue is the result of an incomplete fix for CVE-2020-16599.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-4285&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11081&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils objdump.c dump_dwarf_section out-of-bounds&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11081&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11082&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elf-eh-frame.c _bfd_elf_parse_eh_frame heap-based overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11082&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11083&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elfcode.h elf_swap_shdr heap-based overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11083&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11413&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elflink.c elf_link_add_object_symbols out-of-bounds&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11413&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5244&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils ld elflink.c elf_gc_sweep memory corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5244&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11412&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elflink.c bfd_elf_gc_record_vtentry out-of-bounds&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11412&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11414&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elflink.c get_link_hash_entry out-of-bounds&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11414&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11494&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elfxx-x86.c _bfd_x86_elf_late_size_sections out-of-bounds&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11494&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11495&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elf64-x86-64.c elf_x86_64_relocate_section heap-based overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11495&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11839&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils prdbg.c tg_tag_type return value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11839&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11840&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils ldmisc.c vfinfo out-of-bounds&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11840&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66861&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66862&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66862&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66863&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66863&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66864&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66864&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66866&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66866&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69647&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69647&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69648&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69648&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69649&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69649&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69650&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils thru 2.46 readelf contains a double free vulnerability when processing a crafted ELF binary with malformed relocation data. During GOT relocation handling, dump_relocations may return early without initializing the all_relocations array. As a result, process_got_section_contents() may pass an uninitialized r_symbol pointer to free(), leading to a double free and terminating the program with SIGABRT. No evidence of exploitable memory corruption or code execution was observed; the impact is limited to denial of service. NOTE: this is disputed by third parties because the observed behavior occurred only in pre-release code and did not affect any tagged version.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69652&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69652&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69645&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.8,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69645&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69646&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.8,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69646&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69651&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils thru 2.46 readelf contains a vulnerability that leads to an invalid pointer free when processing a crafted ELF binary with malformed relocation or symbol data. If dump_relocations returns early due to parsing errors, the internal all_relocations array may remain partially uninitialized. Later, process_got_section_contents() may attempt to free an invalid r_symbol pointer, triggering memory corruption checks in glibc and causing the program to terminate with SIGABRT. No evidence of further memory corruption or code execution was observed; the impact is limited to denial of service. NOTE: this is disputed by third parties because the observed behavior occurred only in pre-release code and did not affect any tagged version.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.8,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69651&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2022-4285&#34;,&#xA;                &#34;title&#34; : &#34;An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a denial of service. This issue is the result of an incomplete fix for CVE-2020-16599.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-4285&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=librepo-1.14.5-1.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libxml2-2.9.13-3.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49794&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: heap use after free (uaf) leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49794&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49796&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: type confusion leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56171&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56171&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24928&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24928&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7425&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: libxml2: heap use-after-free in libxslt caused by atype corruption in xmlattrptr&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-25062&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-25062&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32415&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32415&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49795&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: null pointer dereference leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6021&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6021&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7424&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: type confusion in xmlnode.psvi between stylesheet and source nodes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7424&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39615&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39615&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6732&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via crafted xsd-validated document&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6732&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9714&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9714&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1757&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: memory leak leading to local denial of service in xmllint interactive shell&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-49043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-49043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28484&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28484&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-29469&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the &#39;\\0&#39; value).&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0990&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via uncontrolled recursion in xml catalog processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32414&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32414&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-26434&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2, there is a possible out of bounds read due to a buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-26434&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0989&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: unbounded relaxng include recursion leading to stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0992&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via crafted xml catalogs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.9,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0992&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6170&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: stack buffer overflow in xmllint interactive shell command handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6170&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=krb5-1.20.1-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39975&#34;,&#xA;                &#34;title&#34; : &#34;kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26462&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37370&#34;,&#xA;                &#34;title&#34; : &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37370&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-36054&#34;,&#xA;                &#34;title&#34; : &#34;lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-36054&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37371&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37371&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24528&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24528&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26458&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26461&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26461&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3576&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3576&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-setuptools-53.0.0-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-47273&#34;,&#xA;                &#34;title&#34; : &#34;setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-47273&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5713&#34;,&#xA;                &#34;title&#34; : &#34;Out-of-bounds read/write during remote profiling and asyncio process introspection when connecting to malicious target&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5713&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13837&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13837&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4224&#34;,&#xA;                &#34;title&#34; : &#34;Stack overflow parsing XML with deeply nested DTD content models&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4224&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3644&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete control character validation in http.cookies&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3644&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12781&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12781&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3446&#34;,&#xA;                &#34;title&#34; : &#34;Base64 decoding stops at first padded quad by default&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15282&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15282&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1502&#34;,&#xA;                &#34;title&#34; : &#34;HTTP client proxy tunnel headers not validated for CR/LF&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1502&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2297&#34;,&#xA;                &#34;title&#34; : &#34;SourcelessFileLoader does not use io.open_code()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2297&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3479&#34;,&#xA;                &#34;title&#34; : &#34;pkgutil.get_data() does not enforce documented restrictions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3479&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13462&#34;,&#xA;                &#34;title&#34; : &#34;tarfile: Skip DIRTYPE normalization during GNU LONGNAME/LONGLINK handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gnupg2-2.3.3-2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-24882&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-24882&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68973&#34;,&#xA;                &#34;title&#34; : &#34;In GnuPG before 2.4.9, armor_filter in g10/armor.c has two increments of an index variable where one is intended, leading to an out-of-bounds write for crafted input. (For ExtendedLTS, 2.2.51 and later are fixed versions.)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68973&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68972&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68972&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-24882&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-24882&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=curl-7.76.1-23.el9_2.1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2398&#34;,&#xA;                &#34;title&#34; : &#34;HTTP/2 push headers memory-leak&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2398&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27536&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists libcurl &lt;8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27536&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28321&#34;,&#xA;                &#34;title&#34; : &#34;An improper certificate validation vulnerability exists in curl &lt;v8.1.0 in the way it supports matching of wildcard patterns when listed as \&#34;Subject Alternative Name\&#34; in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28321&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27538&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27538&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-46218&#34;,&#xA;                &#34;title&#34; : &#34;This flaw allows a malicious HTTP server to set \&#34;super cookies\&#34; in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl&#39;s function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-46218&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9086&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9086&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27533&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability in input validation exists in curl &lt;8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \&#34;telnet options\&#34; during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application&#39;s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27534&#34;,&#xA;                &#34;title&#34; : &#34;A path traversal vulnerability exists in curl &lt;8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27534&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28322&#34;,&#xA;                &#34;title&#34; : &#34;An information disclosure vulnerability exists in curl &lt;v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28322&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38546&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38546&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=sqlite-3.34.1-6.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-7104&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3277&#34;,&#xA;                &#34;title&#34; : &#34;An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3277&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glib2-2.68.4-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13601&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in in g_escape_uri_string()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-52533&#34;,&#xA;                &#34;title&#34; : &#34;gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing &#39;\\0&#39; character.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-52533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32611&#34;,&#xA;                &#34;title&#34; : &#34;G_variant_byteswap() can take a long time with some non-normal inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32611&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32665&#34;,&#xA;                &#34;title&#34; : &#34;Gvariant deserialisation does not match spec for non-normal data&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32665&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14512&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in glib gio attribute escaping causes heap buffer overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14512&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-29499&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29499&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14087&#34;,&#xA;                &#34;title&#34; : &#34;Glib: glib: buffer underflow in gvariant parser leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14087&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4373&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4373&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-34397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.8,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-34397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7039&#34;,&#xA;                &#34;title&#34; : &#34;Glib: buffer under-read on glib through glib/gfileutils.c via get_tmp_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7039&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0988&#34;,&#xA;                &#34;title&#34; : &#34;Glib: glib: denial of service via integer overflow in g_buffered_input_stream_peek()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0988&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13601&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in in g_escape_uri_string()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gnutls-3.7.6-20.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-0553&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: incomplete fix for cve-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0553&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0567&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0567&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32988&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls othername san export&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32988&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32990&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls certtool template parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6395&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: null pointer dereference in _gnutls_figure_common_ciphersuite()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5981&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12243&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: gnutls impacted by inefficient der decoding in libtasn1 leading to remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12243&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28834&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28834&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14831&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: gnutls: denial of service via excessive resource consumption during certificate verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14831&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32989&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls sct extension parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28835&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28835&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9820&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: stack-based buffer overflow in gnutls_pkcs11_token_init() function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9820&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-0553&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: incomplete fix for cve-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0553&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libgcrypt-1.10.0-10.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2236&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2236&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41990&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 mishandles Dilithium signing. Writes to a static array lack a bounds check but do not use attacker-controlled data.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=expat-2.5.0-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28757&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45490&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8176&#34;,&#xA;                &#34;title&#34; : &#34;Libexpat: expat: improper restriction of xml entity expansion depth in libexpat&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45492&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45492&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50602&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59375&#34;,&#xA;                &#34;title&#34; : &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59375&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41080&#34;,&#xA;                &#34;title&#34; : &#34;libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41080&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=nghttp2-1.43.0-5.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27135&#34;,&#xA;                &#34;title&#34; : &#34;nghttp2 Denial of service: Assertion failure due to the missing state validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27135&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28182&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28182&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=openldap-2.6.2-3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openldap@2.6.2-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=openldap-2.6.2-3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=gmp-6.2.0-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27456&#34;,&#xA;                &#34;title&#34; : &#34;util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27456&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3184&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: access control bypass due to improper hostname canonicalization&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3184&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-pip-21.2.3-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/bsdtar@3.5.3-4.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libarchive-3.5.3-4.el9.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2025-5914&#34;,&#xA;              &#34;title&#34; : &#34;Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-5914&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-4111&#34;,&#xA;              &#34;title&#34; : &#34;Libarchive: infinite loop denial of service in rar5 decompression via archive_read_data() in libarchive&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-4111&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-4424&#34;,&#xA;              &#34;title&#34; : &#34;Libarchive: libarchive: information disclosure via heap out-of-bounds read in rar archive processing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-4424&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-5121&#34;,&#xA;              &#34;title&#34; : &#34;Libarchive: libarchive: arbitrary code execution via integer overflow in iso9660 image processing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-5121&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-57970&#34;,&#xA;              &#34;title&#34; : &#34;libarchive through 3.7.7 has a heap-based buffer over-read in header_gnu_longlink in archive_read_support_format_tar.c via a TAR archive because it mishandles truncation in the middle of a GNU long linkname.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 4.0,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-57970&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-25724&#34;,&#xA;              &#34;title&#34; : &#34;list_item_verbose in tar/util.c in libarchive through 3.7.7 does not check an strftime return value, which can lead to a denial of service or unspecified other impact via a crafted TAR archive that is read with a verbose value of 2. For example, the 100-byte buffer may not be sufficient for a custom locale.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 4.0,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-25724&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libxml2-2.9.13-3.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49794&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: heap use after free (uaf) leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49794&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49796&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: type confusion leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56171&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56171&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24928&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24928&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7425&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: libxml2: heap use-after-free in libxslt caused by atype corruption in xmlattrptr&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-25062&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-25062&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32415&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32415&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49795&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: null pointer dereference leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6021&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6021&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7424&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: type confusion in xmlnode.psvi between stylesheet and source nodes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7424&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39615&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39615&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6732&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via crafted xsd-validated document&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6732&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9714&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9714&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1757&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: memory leak leading to local denial of service in xmllint interactive shell&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-49043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-49043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28484&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28484&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-29469&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the &#39;\\0&#39; value).&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0990&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via uncontrolled recursion in xml catalog processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32414&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32414&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-26434&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2, there is a possible out of bounds read due to a buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-26434&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0989&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: unbounded relaxng include recursion leading to stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0992&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via crafted xml catalogs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.9,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0992&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6170&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: stack buffer overflow in xmllint interactive shell command handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6170&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libarchive-3.5.3-4.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-5914&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5914&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4111&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: infinite loop denial of service in rar5 decompression via archive_read_data() in libarchive&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4111&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4424&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: libarchive: information disclosure via heap out-of-bounds read in rar archive processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4424&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5121&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: libarchive: arbitrary code execution via integer overflow in iso9660 image processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5121&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-60753&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-60753&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-57970&#34;,&#xA;                &#34;title&#34; : &#34;libarchive through 3.7.7 has a heap-based buffer over-read in header_gnu_longlink in archive_read_support_format_tar.c via a TAR archive because it mishandles truncation in the middle of a GNU long linkname.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-57970&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-25724&#34;,&#xA;                &#34;title&#34; : &#34;list_item_verbose in tar/util.c in libarchive through 3.7.7 does not check an strftime return value, which can lead to a denial of service or unspecified other impact via a crafted TAR archive that is read with a verbose value of 2. For example, the 100-byte buffer may not be sufficient for a custom locale.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-25724&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-5914&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5914&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.5?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=httpd-2.4.53-11.el9_2.5.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38475&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38475&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38476&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38476&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27522&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27522&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-31122&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_macro buffer over-read&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31122&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38477&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38477&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-47252&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-47252&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-23048&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-23048&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49812&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49812&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-39573&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-39573&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-58098&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-58098&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38709&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38709&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-65082&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-65082&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66200&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66200&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38473&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server proxy encoding problem&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38473&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-24795&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: HTTP Response Splitting in multiple modules&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-24795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.5?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=httpd-2.4.53-11.el9_2.5.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38475&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38475&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38476&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38476&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27522&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27522&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-31122&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_macro buffer over-read&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31122&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38477&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38477&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-47252&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-47252&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-23048&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-23048&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49812&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49812&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-39573&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-39573&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-58098&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-58098&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38709&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38709&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-65082&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-65082&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66200&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66200&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38473&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server proxy encoding problem&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38473&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-24795&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: HTTP Response Splitting in multiple modules&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-24795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/httpd-filesystem@2.4.53-11.el9_2.5?arch=noarch&amp;distro=rhel-9.2&amp;upstream=httpd-2.4.53-11.el9_2.5.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38475&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38475&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38476&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38476&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27522&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27522&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-31122&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_macro buffer over-read&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31122&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38477&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38477&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-47252&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-47252&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-23048&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-23048&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49812&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49812&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59775&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59775&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-39573&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-39573&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-58098&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-58098&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38709&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38709&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-65082&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-65082&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66200&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66200&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38473&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server proxy encoding problem&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38473&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-24795&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: HTTP Response Splitting in multiple modules&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-24795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=krb5-1.20.1-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39975&#34;,&#xA;                &#34;title&#34; : &#34;kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26462&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37370&#34;,&#xA;                &#34;title&#34; : &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37370&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-36054&#34;,&#xA;                &#34;title&#34; : &#34;lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-36054&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37371&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37371&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24528&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24528&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26458&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26461&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26461&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3576&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3576&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=expat-2.5.0-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28757&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45490&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8176&#34;,&#xA;                &#34;title&#34; : &#34;Libexpat: expat: improper restriction of xml entity expansion depth in libexpat&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45492&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45492&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50602&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59375&#34;,&#xA;                &#34;title&#34; : &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59375&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41080&#34;,&#xA;                &#34;title&#34; : &#34;libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41080&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/apr@1.7.0-11.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=apr-1.7.0-11.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2022-24963&#34;,&#xA;                &#34;title&#34; : &#34;Apache Portable Runtime (APR): out-of-bound writes in the apr_encode family of functions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-24963&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2022-24963&#34;,&#xA;                &#34;title&#34; : &#34;Apache Portable Runtime (APR): out-of-bound writes in the apr_encode family of functions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-24963&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=gmp-6.2.0-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=2&amp;upstream=shadow-utils-4.9-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-4641&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4641&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56433&#34;,&#xA;                &#34;title&#34; : &#34;shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.6,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56433&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-4641&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4641&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;              &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/npm@8.19.3-1.16.19.1.1.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=nodejs-16.19.1-1.el9_2.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2023-39332&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-39332&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-32006&#34;,&#xA;              &#34;title&#34; : &#34;The use of `module.constructor.createRequire()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.\n\nThis vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x, and, 20.x.\n\nPlease note that at the time this CVE was issued, the policy is an experimental feature of Node.js.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-32006&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2022-4904&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.6,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2022-4904&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-32002&#34;,&#xA;              &#34;title&#34; : &#34;The use of `Module._load()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.\n\nThis vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x.\n\nPlease note that at the time this CVE was issued, the policy is an experimental feature of Node.js.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.1,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-32002&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-21892&#34;,&#xA;              &#34;title&#34; : &#34;On Linux, Node.js ignores certain environment variables if those may have been set by an unprivileged user while the process is running with elevated privileges with the only exception of CAP_NET_BIND_SERVICE.\nDue to a bug in the implementation of this exception, Node.js incorrectly applies this exception even when certain other capabilities have been set.\nThis allows unprivileged users to inject code that inherits the process&#39;s elevated privileges.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.1,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-21892&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-21896&#34;,&#xA;              &#34;title&#34; : &#34;The permission model protects itself against path traversal attacks by calling path.resolve() on any paths given by the user. If the path is to be treated as a Buffer, the implementation uses Buffer.from() to obtain a Buffer from the result of path.resolve(). By monkey-patching Buffer internals, namely, Buffer.prototype.utf8Write, the application can modify the result of path.resolve(), which leads to a path traversal vulnerability.\nThis vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21.\nPlease note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.9,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-21896&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-23083&#34;,&#xA;              &#34;title&#34; : &#34;With the aid of the diagnostics_channel utility, an event can be hooked into whenever a worker thread is created. This is not limited only to workers but also exposes internal workers, where an instance of them can be fetched, and its constructor can be grabbed and reinstated for malicious usage. \r\n\r\nThis vulnerability affects Permission Model users (--permission) on Node.js v20, v22, and v23.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.7,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-23083&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;              &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.7,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2021-35065&#34;,&#xA;              &#34;title&#34; : &#34;The glob-parent package before 6.0.1 for Node.js allows ReDoS (regular expression denial of service) attacks against the enclosure regular expression.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2021-35065&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2022-25881&#34;,&#xA;              &#34;title&#34; : &#34;This affects versions of the package http-cache-semantics before 4.1.1. The issue can be exploited via malicious request header values sent to a server, when that server reads the cache policy from the request using this library.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2022-25881&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2022-25883&#34;,&#xA;              &#34;title&#34; : &#34;Versions of the package semver before 7.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.\r\r\r&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2022-25883&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-23918&#34;,&#xA;              &#34;title&#34; : &#34;A privilege escalation vulnerability exists in Node.js &lt;19.6.1, &lt;18.14.1, &lt;16.19.1 and &lt;14.21.3 that made it possible to bypass the experimental Permissions (https://nodejs.org/api/permissions.html) feature in Node.js and access non authorized modules by using process.mainModule.require(). This only affects users who had enabled the experimental permissions option with --experimental-policy.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-23918&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-23919&#34;,&#xA;              &#34;title&#34; : &#34;A cryptographic vulnerability exists in Node.js &lt;19.2.0, &lt;18.14.1, &lt;16.19.1, &lt;14.21.3 that in some cases did does not clear the OpenSSL error stack after operations that may set it. This may lead to false positive errors during subsequent cryptographic operations that happen to be on the same thread. This in turn could be used to cause a denial of service.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-23919&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-24807&#34;,&#xA;              &#34;title&#34; : &#34;Undici vulnerable to Regular Expression Denial of Service in Headers&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-24807&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-30581&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-30581&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-30590&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-30590&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-32067&#34;,&#xA;              &#34;title&#34; : &#34;0-byte UDP payload DoS in c-ares&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-32067&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-32559&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-32559&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-38552&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-38552&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-39331&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-39331&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-22019&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-22019&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-27983&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-27983&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-23166&#34;,&#xA;              &#34;title&#34; : &#34;The C++ method SignTraits::DeriveBits() may incorrectly call ThrowException() based on user-supplied inputs when executing in a background thread, crashing the Node.js process. Such cryptographic operations are commonly applied to untrusted inputs. Thus, this mechanism potentially allows an adversary to remotely crash a Node.js runtime.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-23166&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-59465&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-59465&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-1526&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-1526&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-1528&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-1528&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-21710&#34;,&#xA;              &#34;title&#34; : &#34;A flaw in Node.js HTTP request handling causes an uncaught `TypeError` when a request is received with a header named `__proto__` and the application accesses `req.headersDistinct`.\r\n\r\nWhen this occurs, `dest[\&#34;__proto__\&#34;]` resolves to `Object.prototype` rather than `undefined`, causing `.push()` to be called on a non-array. This exception is thrown synchronously inside a property getter and cannot be intercepted by `error` event listeners, meaning it cannot be handled without wrapping every `req.headersDistinct` access in a `try/catch`.\r\n\r\n* This vulnerability affects all Node.js HTTP servers on **20.x, 22.x, 24.x, and v25.x**&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-21710&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-2229&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-2229&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-27135&#34;,&#xA;              &#34;title&#34; : &#34;nghttp2 Denial of service: Assertion failure due to the missing state validation&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-27135&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-22017&#34;,&#xA;              &#34;title&#34; : &#34;setuid() does not affect libuv&#39;s internal io_uring operations if initialized before the call to setuid().\nThis allows the process to perform privileged operations despite presumably having dropped such privileges through a call to setuid().\nThis vulnerability affects all users using version greater or equal than Node.js 18.18.0, Node.js 20.4.0 and Node.js 21.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.3,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-22017&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-3277&#34;,&#xA;              &#34;title&#34; : &#34;An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.3,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-3277&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-1525&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.3,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-1525&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-55130&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.1,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-55130&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-55131&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.1,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-55131&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-30589&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.0,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-30589&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-31498&#34;,&#xA;              &#34;title&#34; : &#34;c-ares has a use-after-free in read_answers()&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.0,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-31498&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-22150&#34;,&#xA;              &#34;title&#34; : &#34;Undici Uses Insufficiently Random Values&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.8,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-22150&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-21891&#34;,&#xA;              &#34;title&#34; : &#34;Node.js depends on multiple built-in utility functions to normalize paths provided to node:fs functions, which can be overwitten with user-defined implementations leading to filesystem permission model bypass through path traversal attack.\nThis vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21.\nPlease note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.6,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-21891&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-23936&#34;,&#xA;              &#34;title&#34; : &#34;CRLF Injection in Nodejs ‘undici’ via host&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-23936&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-22020&#34;,&#xA;              &#34;title&#34; : &#34;A security flaw in Node.js  allows a bypass of network import restrictions.\nBy embedding non-network imports in data URLs, an attacker can execute arbitrary code, compromising system security.\nVerified on various platforms, the vulnerability is mitigated by forbidding data URLs in network imports.\nExploiting this flaw can violate network import security, posing a risk to developers and servers.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-22020&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-22025&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-22025&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-28863&#34;,&#xA;              &#34;title&#34; : &#34;node-tar vulnerable to denial of service while parsing a tar file due to lack of folders count validation&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-28863&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-23167&#34;,&#xA;              &#34;title&#34; : &#34;A flaw in Node.js 20&#39;s HTTP parser allows improper termination of HTTP/1 headers using `\\r\\n\\rX` instead of the required `\\r\\n\\r\\n`.\nThis inconsistency enables request smuggling, allowing attackers to bypass proxy-based access controls and submit unauthorized requests.\n\nThe issue was resolved by upgrading `llhttp` to version 9, which enforces correct header termination.\n\nImpact:\n* This vulnerability affects only Node.js 20.x users prior to the `llhttp` v9 upgrade.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-23167&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-1527&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-1527&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-21712&#34;,&#xA;              &#34;title&#34; : &#34;A flaw in Node.js URL processing causes an assertion failure in native code when `url.format()` is called with a malformed internationalized domain name (IDN) containing invalid characters, crashing the Node.js process.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-21712&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-25547&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-25547&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-26996&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-26996&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-27904&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-27904&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-27982&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.1,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-27982&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-31147&#34;,&#xA;              &#34;title&#34; : &#34;Insufficient randomness in generation of DNS query IDs in c-ares&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-31147&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-46809&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-46809&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-59466&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-59466&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-21637&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-21637&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-21713&#34;,&#xA;              &#34;title&#34; : &#34;A flaw in Node.js HMAC verification uses a non-constant-time comparison when validating user-provided signatures, potentially leaking timing information proportional to the number of matching bytes. Under certain threat models where high-resolution timing measurements are possible, this behavior could be exploited as a timing oracle to infer HMAC values.\r\n\r\nNode.js already provides timing-safe comparison primitives used elsewhere in the codebase, indicating this is an oversight rather than an intentional design decision.\r\n\r\nThis vulnerability affects **20.x, 22.x, 24.x, and 25.x**.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-21713&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-21717&#34;,&#xA;              &#34;title&#34; : &#34;A flaw in V8&#39;s string hashing mechanism causes integer-like strings to be hashed to their numeric value, making hash collisions trivially predictable. By crafting a request that causes many such collisions in V8&#39;s internal string table, an attacker can significantly degrade performance of the Node.js process.\r\n\r\nThe most common trigger is any endpoint that calls `JSON.parse()` on attacker-controlled input, as JSON parsing automatically internalizes short strings into the affected hash table.\r\n\r\nThis vulnerability affects **20.x, 22.x, 24.x, and 25.x**.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-21717&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-2581&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-2581&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-31130&#34;,&#xA;              &#34;title&#34; : &#34;Buffer Underwrite in ares_inet_net_pton()&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.7,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-31130&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-30588&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-30588&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-39333&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-39333&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-28182&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-28182&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-23085&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-23085&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-55132&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-55132&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-21714&#34;,&#xA;              &#34;title&#34; : &#34;A memory leak occurs in Node.js HTTP/2 servers when a client sends WINDOW_UPDATE frames on stream 0 (connection-level) that cause the flow control window to exceed the maximum value of 2³¹-1. The server correctly sends a GOAWAY frame, but the Http2Session object is never cleaned up.\r\n\r\nThis vulnerability affects HTTP2 users on Node.js 20, 22, 24 and 25.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-21714&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-21711&#34;,&#xA;              &#34;title&#34; : &#34;A flaw in Node.js Permission Model network enforcement leaves Unix Domain Socket (UDS) server operations without the required permission checks, while all comparable network paths correctly enforce them.\r\n\r\nAs a result, code running under `--permission` without `--allow-net` can create and expose local IPC endpoints, allowing communication with other processes on the same host outside of the intended network restriction boundary.\r\n\r\nThis vulnerability affects Node.js **25.x** processes using the Permission Model where `--allow-net` is intentionally omitted to restrict network access. Note that `--allow-net` is currently an experimental feature.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.2,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-21711&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-21890&#34;,&#xA;              &#34;title&#34; : &#34;The Node.js Permission Model does not clarify in the documentation that wildcards should be only used as the last character of a file path. For example:\n```\n --allow-fs-read=/home/node/.ssh/*.pub\n```\n\nwill ignore `pub` and give access to everything after `.ssh/`.\n\nThis misleading documentation affects all users using the experimental permission model in Node.js 20 and Node.js 21.\n\nPlease note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.0,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-21890&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-25629&#34;,&#xA;              &#34;title&#34; : &#34;c-ares out of bounds read in ares__read_line()&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 4.4,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-25629&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-23920&#34;,&#xA;              &#34;title&#34; : &#34;An untrusted search path vulnerability exists in Node.js. &lt;19.6.1, &lt;18.14.1, &lt;16.19.1, and &lt;14.21.3 that could allow an attacker to search and potentially load ICU data when running with elevated privileges.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 4.2,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-23920&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-45143&#34;,&#xA;              &#34;title&#34; : &#34;Undici&#39;s cookie header not cleared on cross-origin redirect in fetch&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 3.9,&#xA;              &#34;severity&#34; : &#34;LOW&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-45143&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-36137&#34;,&#xA;              &#34;title&#34; : &#34;A vulnerability has been identified in Node.js, affecting users of the experimental permission model when the --allow-fs-write flag is used.\r\n\r\nNode.js Permission Model do not operate on file descriptors, however, operations such as fs.fchown or fs.fchmod can use a \&#34;read-only\&#34; file descriptor to change the owner and permissions of a file.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 3.9,&#xA;              &#34;severity&#34; : &#34;LOW&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-36137&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-21716&#34;,&#xA;              &#34;title&#34; : &#34;An incomplete fix for CVE-2024-36137 leaves `FileHandle.chmod()` and `FileHandle.chown()` in the promises API without the required permission checks, while their callback-based equivalents (`fs.fchmod()`, `fs.fchown()`) were correctly patched.\r\n\r\nAs a result, code running under `--permission` with restricted `--allow-fs-write` can still use promise-based `FileHandle` methods to modify file permissions and ownership on already-open file descriptors, bypassing the intended write restrictions.\r\n\r\nThis vulnerability affects **20.x, 22.x, 24.x, and 25.x** processes using the Permission Model where `--allow-fs-write` is intentionally restricted.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 3.8,&#xA;              &#34;severity&#34; : &#34;LOW&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-21716&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-31124&#34;,&#xA;              &#34;title&#34; : &#34;AutoTools does not set CARES_RANDOM_FILE during cross compilation&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 3.7,&#xA;              &#34;severity&#34; : &#34;LOW&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-31124&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-23165&#34;,&#xA;              &#34;title&#34; : &#34;In Node.js, the `ReadFileUtf8` internal binding leaks memory due to a corrupted pointer in `uv_fs_s.file`: a UTF-16 path buffer is allocated but subsequently overwritten when the file descriptor is set. This results in an unrecoverable memory leak on every call. Repeated use can cause unbounded memory growth, leading to a denial of service.\r\n\r\nImpact:\r\n* This vulnerability affects APIs relying on `ReadFileUtf8` on Node.js release lines: v20 and v22.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 3.7,&#xA;              &#34;severity&#34; : &#34;LOW&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-23165&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-21715&#34;,&#xA;              &#34;title&#34; : &#34;A flaw in Node.js Permission Model filesystem enforcement leaves `fs.realpathSync.native()` without the required read permission checks, while all comparable filesystem functions correctly enforce them.\r\n\r\nAs a result, code running under `--permission` with restricted `--allow-fs-read` can still use `fs.realpathSync.native()` to check file existence, resolve symlink targets, and enumerate filesystem paths outside of permitted directories.\r\n\r\nThis vulnerability affects **20.x, 22.x, 24.x, and 25.x** processes using the Permission Model where `--allow-fs-read` is intentionally restricted.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 3.3,&#xA;              &#34;severity&#34; : &#34;LOW&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-21715&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-22018&#34;,&#xA;              &#34;title&#34; : &#34;A vulnerability has been identified in Node.js, affecting users of the experimental permission model when the --allow-fs-read flag is used.\nThis flaw arises from an inadequate permission model that fails to restrict file stats through the fs.lstat API. As a result, malicious actors can retrieve stats from files that they do not have explicit read access to.\nThis vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21.\nPlease note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 2.9,&#xA;              &#34;severity&#34; : &#34;LOW&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-22018&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/nodejs@16.19.1-1.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=nodejs-16.19.1-1.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-39332&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39332&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32006&#34;,&#xA;                &#34;title&#34; : &#34;The use of `module.constructor.createRequire()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.\n\nThis vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x, and, 20.x.\n\nPlease note that at the time this CVE was issued, the policy is an experimental feature of Node.js.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32006&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-4904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-4904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-35255&#34;,&#xA;                &#34;title&#34; : &#34;A weak randomness in WebCrypto keygen vulnerability exists in Node.js 18 due to a change with EntropySource() in SecretKeyGenTraits::DoKeyGen() in src/crypto/crypto_keygen.cc. There are two problems with this: 1) It does not check the return value, it assumes EntropySource() always succeeds, but it can (and sometimes will) fail. 2) The random data returned byEntropySource() may not be cryptographically strong and therefore not suitable as keying material.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.2,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-35255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32002&#34;,&#xA;                &#34;title&#34; : &#34;The use of `Module._load()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.\n\nThis vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x.\n\nPlease note that at the time this CVE was issued, the policy is an experimental feature of Node.js.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32002&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-21892&#34;,&#xA;                &#34;title&#34; : &#34;On Linux, Node.js ignores certain environment variables if those may have been set by an unprivileged user while the process is running with elevated privileges with the only exception of CAP_NET_BIND_SERVICE.\nDue to a bug in the implementation of this exception, Node.js incorrectly applies this exception even when certain other capabilities have been set.\nThis allows unprivileged users to inject code that inherits the process&#39;s elevated privileges.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-21892&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-21896&#34;,&#xA;                &#34;title&#34; : &#34;The permission model protects itself against path traversal attacks by calling path.resolve() on any paths given by the user. If the path is to be treated as a Buffer, the implementation uses Buffer.from() to obtain a Buffer from the result of path.resolve(). By monkey-patching Buffer internals, namely, Buffer.prototype.utf8Write, the application can modify the result of path.resolve(), which leads to a path traversal vulnerability.\nThis vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21.\nPlease note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.9,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-21896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-23083&#34;,&#xA;                &#34;title&#34; : &#34;With the aid of the diagnostics_channel utility, an event can be hooked into whenever a worker thread is created. This is not limited only to workers but also exposes internal workers, where an instance of them can be fetched, and its constructor can be grabbed and reinstated for malicious usage. \r\n\r\nThis vulnerability affects Permission Model users (--permission) on Node.js v20, v22, and v23.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-23083&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35065&#34;,&#xA;                &#34;title&#34; : &#34;The glob-parent package before 6.0.1 for Node.js allows ReDoS (regular expression denial of service) attacks against the enclosure regular expression.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35065&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-25881&#34;,&#xA;                &#34;title&#34; : &#34;This affects versions of the package http-cache-semantics before 4.1.1. The issue can be exploited via malicious request header values sent to a server, when that server reads the cache policy from the request using this library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-25881&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-25883&#34;,&#xA;                &#34;title&#34; : &#34;Versions of the package semver before 7.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.\r\r\r&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-25883&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-3517&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the minimatch package. This flaw allows a Regular Expression Denial of Service (ReDoS) when calling the braceExpand function with specific arguments, resulting in a Denial of Service.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-3517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-43548&#34;,&#xA;                &#34;title&#34; : &#34;A OS Command Injection vulnerability exists in Node.js versions &lt;14.21.1, &lt;16.18.1, &lt;18.12.1, &lt;19.0.1 due to an insufficient IsAllowedHost check that can easily be bypassed because IsIPAddress does not properly check if an IP address is invalid before making DBS requests allowing rebinding attacks.The fix for this issue in https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212 was incomplete and this new CVE is to complete the fix.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-43548&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-23918&#34;,&#xA;                &#34;title&#34; : &#34;A privilege escalation vulnerability exists in Node.js &lt;19.6.1, &lt;18.14.1, &lt;16.19.1 and &lt;14.21.3 that made it possible to bypass the experimental Permissions (https://nodejs.org/api/permissions.html) feature in Node.js and access non authorized modules by using process.mainModule.require(). This only affects users who had enabled the experimental permissions option with --experimental-policy.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-23918&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-23919&#34;,&#xA;                &#34;title&#34; : &#34;A cryptographic vulnerability exists in Node.js &lt;19.2.0, &lt;18.14.1, &lt;16.19.1, &lt;14.21.3 that in some cases did does not clear the OpenSSL error stack after operations that may set it. This may lead to false positive errors during subsequent cryptographic operations that happen to be on the same thread. This in turn could be used to cause a denial of service.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-23919&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24807&#34;,&#xA;                &#34;title&#34; : &#34;Undici vulnerable to Regular Expression Denial of Service in Headers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24807&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-30581&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-30581&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-30590&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-30590&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32067&#34;,&#xA;                &#34;title&#34; : &#34;0-byte UDP payload DoS in c-ares&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32067&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32559&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38552&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38552&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39331&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39331&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-22019&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-22019&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-27983&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-27983&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-23166&#34;,&#xA;                &#34;title&#34; : &#34;The C++ method SignTraits::DeriveBits() may incorrectly call ThrowException() based on user-supplied inputs when executing in a background thread, crashing the Node.js process. Such cryptographic operations are commonly applied to untrusted inputs. Thus, this mechanism potentially allows an adversary to remotely crash a Node.js runtime.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-23166&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59465&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1526&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1526&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1528&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1528&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-21710&#34;,&#xA;                &#34;title&#34; : &#34;A flaw in Node.js HTTP request handling causes an uncaught `TypeError` when a request is received with a header named `__proto__` and the application accesses `req.headersDistinct`.\r\n\r\nWhen this occurs, `dest[\&#34;__proto__\&#34;]` resolves to `Object.prototype` rather than `undefined`, causing `.push()` to be called on a non-array. This exception is thrown synchronously inside a property getter and cannot be intercepted by `error` event listeners, meaning it cannot be handled without wrapping every `req.headersDistinct` access in a `try/catch`.\r\n\r\n* This vulnerability affects all Node.js HTTP servers on **20.x, 22.x, 24.x, and v25.x**&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-21710&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2229&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2229&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27135&#34;,&#xA;                &#34;title&#34; : &#34;nghttp2 Denial of service: Assertion failure due to the missing state validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27135&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-22017&#34;,&#xA;                &#34;title&#34; : &#34;setuid() does not affect libuv&#39;s internal io_uring operations if initialized before the call to setuid().\nThis allows the process to perform privileged operations despite presumably having dropped such privileges through a call to setuid().\nThis vulnerability affects all users using version greater or equal than Node.js 18.18.0, Node.js 20.4.0 and Node.js 21.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-22017&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3277&#34;,&#xA;                &#34;title&#34; : &#34;An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3277&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1525&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1525&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-55130&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-55130&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-55131&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-55131&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-30589&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-30589&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-31498&#34;,&#xA;                &#34;title&#34; : &#34;c-ares has a use-after-free in read_answers()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31498&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22150&#34;,&#xA;                &#34;title&#34; : &#34;Undici Uses Insufficiently Random Values&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22150&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-21891&#34;,&#xA;                &#34;title&#34; : &#34;Node.js depends on multiple built-in utility functions to normalize paths provided to node:fs functions, which can be overwitten with user-defined implementations leading to filesystem permission model bypass through path traversal attack.\nThis vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21.\nPlease note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-21891&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-35256&#34;,&#xA;                &#34;title&#34; : &#34;The llhttp parser in the http module in Node v18.7.0 does not correctly handle header fields that are not terminated with CLRF. This may result in HTTP Request Smuggling.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-35256&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-23936&#34;,&#xA;                &#34;title&#34; : &#34;CRLF Injection in Nodejs ‘undici’ via host&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-23936&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-22020&#34;,&#xA;                &#34;title&#34; : &#34;A security flaw in Node.js  allows a bypass of network import restrictions.\nBy embedding non-network imports in data URLs, an attacker can execute arbitrary code, compromising system security.\nVerified on various platforms, the vulnerability is mitigated by forbidding data URLs in network imports.\nExploiting this flaw can violate network import security, posing a risk to developers and servers.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-22020&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-22025&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-22025&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28863&#34;,&#xA;                &#34;title&#34; : &#34;node-tar vulnerable to denial of service while parsing a tar file due to lack of folders count validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28863&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-23167&#34;,&#xA;                &#34;title&#34; : &#34;A flaw in Node.js 20&#39;s HTTP parser allows improper termination of HTTP/1 headers using `\\r\\n\\rX` instead of the required `\\r\\n\\r\\n`.\nThis inconsistency enables request smuggling, allowing attackers to bypass proxy-based access controls and submit unauthorized requests.\n\nThe issue was resolved by upgrading `llhttp` to version 9, which enforces correct header termination.\n\nImpact:\n* This vulnerability affects only Node.js 20.x users prior to the `llhttp` v9 upgrade.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-23167&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-21712&#34;,&#xA;                &#34;title&#34; : &#34;A flaw in Node.js URL processing causes an assertion failure in native code when `url.format()` is called with a malformed internationalized domain name (IDN) containing invalid characters, crashing the Node.js process.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-21712&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-25547&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-25547&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-26996&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-26996&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-27982&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-27982&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-31147&#34;,&#xA;                &#34;title&#34; : &#34;Insufficient randomness in generation of DNS query IDs in c-ares&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31147&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-46809&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-46809&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59466&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-21637&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-21637&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-21713&#34;,&#xA;                &#34;title&#34; : &#34;A flaw in Node.js HMAC verification uses a non-constant-time comparison when validating user-provided signatures, potentially leaking timing information proportional to the number of matching bytes. Under certain threat models where high-resolution timing measurements are possible, this behavior could be exploited as a timing oracle to infer HMAC values.\r\n\r\nNode.js already provides timing-safe comparison primitives used elsewhere in the codebase, indicating this is an oversight rather than an intentional design decision.\r\n\r\nThis vulnerability affects **20.x, 22.x, 24.x, and 25.x**.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-21713&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-21717&#34;,&#xA;                &#34;title&#34; : &#34;A flaw in V8&#39;s string hashing mechanism causes integer-like strings to be hashed to their numeric value, making hash collisions trivially predictable. By crafting a request that causes many such collisions in V8&#39;s internal string table, an attacker can significantly degrade performance of the Node.js process.\r\n\r\nThe most common trigger is any endpoint that calls `JSON.parse()` on attacker-controlled input, as JSON parsing automatically internalizes short strings into the affected hash table.\r\n\r\nThis vulnerability affects **20.x, 22.x, 24.x, and 25.x**.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-21717&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2581&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2581&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-31130&#34;,&#xA;                &#34;title&#34; : &#34;Buffer Underwrite in ares_inet_net_pton()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31130&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-30588&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-30588&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39333&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39333&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28182&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28182&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-23085&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-23085&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-21714&#34;,&#xA;                &#34;title&#34; : &#34;A memory leak occurs in Node.js HTTP/2 servers when a client sends WINDOW_UPDATE frames on stream 0 (connection-level) that cause the flow control window to exceed the maximum value of 2³¹-1. The server correctly sends a GOAWAY frame, but the Http2Session object is never cleaned up.\r\n\r\nThis vulnerability affects HTTP2 users on Node.js 20, 22, 24 and 25.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-21714&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-21711&#34;,&#xA;                &#34;title&#34; : &#34;A flaw in Node.js Permission Model network enforcement leaves Unix Domain Socket (UDS) server operations without the required permission checks, while all comparable network paths correctly enforce them.\r\n\r\nAs a result, code running under `--permission` without `--allow-net` can create and expose local IPC endpoints, allowing communication with other processes on the same host outside of the intended network restriction boundary.\r\n\r\nThis vulnerability affects Node.js **25.x** processes using the Permission Model where `--allow-net` is intentionally omitted to restrict network access. Note that `--allow-net` is currently an experimental feature.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-21711&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-21890&#34;,&#xA;                &#34;title&#34; : &#34;The Node.js Permission Model does not clarify in the documentation that wildcards should be only used as the last character of a file path. For example:\n```\n --allow-fs-read=/home/node/.ssh/*.pub\n```\n\nwill ignore `pub` and give access to everything after `.ssh/`.\n\nThis misleading documentation affects all users using the experimental permission model in Node.js 20 and Node.js 21.\n\nPlease note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-21890&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-25629&#34;,&#xA;                &#34;title&#34; : &#34;c-ares out of bounds read in ares__read_line()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-25629&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-23920&#34;,&#xA;                &#34;title&#34; : &#34;An untrusted search path vulnerability exists in Node.js. &lt;19.6.1, &lt;18.14.1, &lt;16.19.1, and &lt;14.21.3 that could allow an attacker to search and potentially load ICU data when running with elevated privileges.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-23920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-45143&#34;,&#xA;                &#34;title&#34; : &#34;Undici&#39;s cookie header not cleared on cross-origin redirect in fetch&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.9,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-45143&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-36137&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability has been identified in Node.js, affecting users of the experimental permission model when the --allow-fs-write flag is used.\r\n\r\nNode.js Permission Model do not operate on file descriptors, however, operations such as fs.fchown or fs.fchmod can use a \&#34;read-only\&#34; file descriptor to change the owner and permissions of a file.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.9,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-36137&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-21716&#34;,&#xA;                &#34;title&#34; : &#34;An incomplete fix for CVE-2024-36137 leaves `FileHandle.chmod()` and `FileHandle.chown()` in the promises API without the required permission checks, while their callback-based equivalents (`fs.fchmod()`, `fs.fchown()`) were correctly patched.\r\n\r\nAs a result, code running under `--permission` with restricted `--allow-fs-write` can still use promise-based `FileHandle` methods to modify file permissions and ownership on already-open file descriptors, bypassing the intended write restrictions.\r\n\r\nThis vulnerability affects **20.x, 22.x, 24.x, and 25.x** processes using the Permission Model where `--allow-fs-write` is intentionally restricted.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.8,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-21716&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-31124&#34;,&#xA;                &#34;title&#34; : &#34;AutoTools does not set CARES_RANDOM_FILE during cross compilation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31124&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-23165&#34;,&#xA;                &#34;title&#34; : &#34;In Node.js, the `ReadFileUtf8` internal binding leaks memory due to a corrupted pointer in `uv_fs_s.file`: a UTF-16 path buffer is allocated but subsequently overwritten when the file descriptor is set. This results in an unrecoverable memory leak on every call. Repeated use can cause unbounded memory growth, leading to a denial of service.\r\n\r\nImpact:\r\n* This vulnerability affects APIs relying on `ReadFileUtf8` on Node.js release lines: v20 and v22.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-23165&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-21715&#34;,&#xA;                &#34;title&#34; : &#34;A flaw in Node.js Permission Model filesystem enforcement leaves `fs.realpathSync.native()` without the required read permission checks, while all comparable filesystem functions correctly enforce them.\r\n\r\nAs a result, code running under `--permission` with restricted `--allow-fs-read` can still use `fs.realpathSync.native()` to check file existence, resolve symlink targets, and enumerate filesystem paths outside of permitted directories.\r\n\r\nThis vulnerability affects **20.x, 22.x, 24.x, and 25.x** processes using the Permission Model where `--allow-fs-read` is intentionally restricted.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-21715&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-22018&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability has been identified in Node.js, affecting users of the experimental permission model when the --allow-fs-read flag is used.\nThis flaw arises from an inadequate permission model that fails to restrict file stats through the fs.lstat API. As a result, malicious actors can retrieve stats from files that they do not have explicit read access to.\nThis vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21.\nPlease note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.9,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-22018&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-55132&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.8,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-55132&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-39332&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39332&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28390&#34;,&#xA;                &#34;title&#34; : &#34;Possible NULL Dereference When Processing CMS KeyTransportRecipientInfo&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28390&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9231&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9231&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28388&#34;,&#xA;                &#34;title&#34; : &#34;NULL Pointer Dereference When Processing a Delta CRL&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28388&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28389&#34;,&#xA;                &#34;title&#34; : &#34;Possible NULL Dereference When Processing CMS KeyAgreeRecipientInfo&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28389&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-31790&#34;,&#xA;                &#34;title&#34; : &#34;Incorrect Failure Handling in RSA KEM RSASVE Encapsulation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-31790&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-31789&#34;,&#xA;                &#34;title&#34; : &#34;Heap Buffer Overflow in Hexadecimal Conversion&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-31789&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28386&#34;,&#xA;                &#34;title&#34; : &#34;Out-of-bounds Read in AES-CFB-128 on X86-64 with AVX-512 Support&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28386&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28387&#34;,&#xA;                &#34;title&#34; : &#34;Potential Use-after-free in DANE Client Code&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28387&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.1,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2673&#34;,&#xA;                &#34;title&#34; : &#34;OpenSSL TLS 1.3 server may choose unexpected key agreement group&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.1,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2673&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/nodejs-libs@16.19.1-1.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=nodejs-16.19.1-1.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-32006&#34;,&#xA;                &#34;title&#34; : &#34;The use of `module.constructor.createRequire()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.\n\nThis vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x, and, 20.x.\n\nPlease note that at the time this CVE was issued, the policy is an experimental feature of Node.js.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32006&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-4904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-4904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32002&#34;,&#xA;                &#34;title&#34; : &#34;The use of `Module._load()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.\n\nThis vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x.\n\nPlease note that at the time this CVE was issued, the policy is an experimental feature of Node.js.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32002&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-23083&#34;,&#xA;                &#34;title&#34; : &#34;With the aid of the diagnostics_channel utility, an event can be hooked into whenever a worker thread is created. This is not limited only to workers but also exposes internal workers, where an instance of them can be fetched, and its constructor can be grabbed and reinstated for malicious usage. \r\n\r\nThis vulnerability affects Permission Model users (--permission) on Node.js v20, v22, and v23.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-23083&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-25881&#34;,&#xA;                &#34;title&#34; : &#34;This affects versions of the package http-cache-semantics before 4.1.1. The issue can be exploited via malicious request header values sent to a server, when that server reads the cache policy from the request using this library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-25881&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24807&#34;,&#xA;                &#34;title&#34; : &#34;Undici vulnerable to Regular Expression Denial of Service in Headers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24807&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-30581&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-30581&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-30590&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-30590&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32067&#34;,&#xA;                &#34;title&#34; : &#34;0-byte UDP payload DoS in c-ares&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32067&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32559&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-22019&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-22019&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-27983&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-27983&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-23166&#34;,&#xA;                &#34;title&#34; : &#34;The C++ method SignTraits::DeriveBits() may incorrectly call ThrowException() based on user-supplied inputs when executing in a background thread, crashing the Node.js process. Such cryptographic operations are commonly applied to untrusted inputs. Thus, this mechanism potentially allows an adversary to remotely crash a Node.js runtime.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-23166&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59465&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1526&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1526&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1528&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1528&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-21710&#34;,&#xA;                &#34;title&#34; : &#34;A flaw in Node.js HTTP request handling causes an uncaught `TypeError` when a request is received with a header named `__proto__` and the application accesses `req.headersDistinct`.\r\n\r\nWhen this occurs, `dest[\&#34;__proto__\&#34;]` resolves to `Object.prototype` rather than `undefined`, causing `.push()` to be called on a non-array. This exception is thrown synchronously inside a property getter and cannot be intercepted by `error` event listeners, meaning it cannot be handled without wrapping every `req.headersDistinct` access in a `try/catch`.\r\n\r\n* This vulnerability affects all Node.js HTTP servers on **20.x, 22.x, 24.x, and v25.x**&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-21710&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2229&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2229&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27135&#34;,&#xA;                &#34;title&#34; : &#34;nghttp2 Denial of service: Assertion failure due to the missing state validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27135&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3277&#34;,&#xA;                &#34;title&#34; : &#34;An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3277&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1525&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1525&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-55130&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-55130&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-55131&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-55131&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-30589&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-30589&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-31498&#34;,&#xA;                &#34;title&#34; : &#34;c-ares has a use-after-free in read_answers()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31498&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22150&#34;,&#xA;                &#34;title&#34; : &#34;Undici Uses Insufficiently Random Values&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22150&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-23936&#34;,&#xA;                &#34;title&#34; : &#34;CRLF Injection in Nodejs ‘undici’ via host&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-23936&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-22025&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-22025&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-21712&#34;,&#xA;                &#34;title&#34; : &#34;A flaw in Node.js URL processing causes an assertion failure in native code when `url.format()` is called with a malformed internationalized domain name (IDN) containing invalid characters, crashing the Node.js process.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-21712&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-25547&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-25547&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-26996&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-26996&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-27982&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-27982&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-31147&#34;,&#xA;                &#34;title&#34; : &#34;Insufficient randomness in generation of DNS query IDs in c-ares&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31147&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59466&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-21637&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-21637&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-21713&#34;,&#xA;                &#34;title&#34; : &#34;A flaw in Node.js HMAC verification uses a non-constant-time comparison when validating user-provided signatures, potentially leaking timing information proportional to the number of matching bytes. Under certain threat models where high-resolution timing measurements are possible, this behavior could be exploited as a timing oracle to infer HMAC values.\r\n\r\nNode.js already provides timing-safe comparison primitives used elsewhere in the codebase, indicating this is an oversight rather than an intentional design decision.\r\n\r\nThis vulnerability affects **20.x, 22.x, 24.x, and 25.x**.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-21713&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-21717&#34;,&#xA;                &#34;title&#34; : &#34;A flaw in V8&#39;s string hashing mechanism causes integer-like strings to be hashed to their numeric value, making hash collisions trivially predictable. By crafting a request that causes many such collisions in V8&#39;s internal string table, an attacker can significantly degrade performance of the Node.js process.\r\n\r\nThe most common trigger is any endpoint that calls `JSON.parse()` on attacker-controlled input, as JSON parsing automatically internalizes short strings into the affected hash table.\r\n\r\nThis vulnerability affects **20.x, 22.x, 24.x, and 25.x**.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-21717&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2581&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2581&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-31130&#34;,&#xA;                &#34;title&#34; : &#34;Buffer Underwrite in ares_inet_net_pton()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31130&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-30588&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-30588&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28182&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28182&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-23085&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-23085&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-21714&#34;,&#xA;                &#34;title&#34; : &#34;A memory leak occurs in Node.js HTTP/2 servers when a client sends WINDOW_UPDATE frames on stream 0 (connection-level) that cause the flow control window to exceed the maximum value of 2³¹-1. The server correctly sends a GOAWAY frame, but the Http2Session object is never cleaned up.\r\n\r\nThis vulnerability affects HTTP2 users on Node.js 20, 22, 24 and 25.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-21714&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-21711&#34;,&#xA;                &#34;title&#34; : &#34;A flaw in Node.js Permission Model network enforcement leaves Unix Domain Socket (UDS) server operations without the required permission checks, while all comparable network paths correctly enforce them.\r\n\r\nAs a result, code running under `--permission` without `--allow-net` can create and expose local IPC endpoints, allowing communication with other processes on the same host outside of the intended network restriction boundary.\r\n\r\nThis vulnerability affects Node.js **25.x** processes using the Permission Model where `--allow-net` is intentionally omitted to restrict network access. Note that `--allow-net` is currently an experimental feature.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-21711&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-25629&#34;,&#xA;                &#34;title&#34; : &#34;c-ares out of bounds read in ares__read_line()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-25629&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-23920&#34;,&#xA;                &#34;title&#34; : &#34;An untrusted search path vulnerability exists in Node.js. &lt;19.6.1, &lt;18.14.1, &lt;16.19.1, and &lt;14.21.3 that could allow an attacker to search and potentially load ICU data when running with elevated privileges.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-23920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-21716&#34;,&#xA;                &#34;title&#34; : &#34;An incomplete fix for CVE-2024-36137 leaves `FileHandle.chmod()` and `FileHandle.chown()` in the promises API without the required permission checks, while their callback-based equivalents (`fs.fchmod()`, `fs.fchown()`) were correctly patched.\r\n\r\nAs a result, code running under `--permission` with restricted `--allow-fs-write` can still use promise-based `FileHandle` methods to modify file permissions and ownership on already-open file descriptors, bypassing the intended write restrictions.\r\n\r\nThis vulnerability affects **20.x, 22.x, 24.x, and 25.x** processes using the Permission Model where `--allow-fs-write` is intentionally restricted.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.8,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-21716&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-31124&#34;,&#xA;                &#34;title&#34; : &#34;AutoTools does not set CARES_RANDOM_FILE during cross compilation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31124&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-23165&#34;,&#xA;                &#34;title&#34; : &#34;In Node.js, the `ReadFileUtf8` internal binding leaks memory due to a corrupted pointer in `uv_fs_s.file`: a UTF-16 path buffer is allocated but subsequently overwritten when the file descriptor is set. This results in an unrecoverable memory leak on every call. Repeated use can cause unbounded memory growth, leading to a denial of service.\r\n\r\nImpact:\r\n* This vulnerability affects APIs relying on `ReadFileUtf8` on Node.js release lines: v20 and v22.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-23165&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-21715&#34;,&#xA;                &#34;title&#34; : &#34;A flaw in Node.js Permission Model filesystem enforcement leaves `fs.realpathSync.native()` without the required read permission checks, while all comparable filesystem functions correctly enforce them.\r\n\r\nAs a result, code running under `--permission` with restricted `--allow-fs-read` can still use `fs.realpathSync.native()` to check file existence, resolve symlink targets, and enumerate filesystem paths outside of permitted directories.\r\n\r\nThis vulnerability affects **20.x, 22.x, 24.x, and 25.x** processes using the Permission Model where `--allow-fs-read` is intentionally restricted.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-21715&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-55132&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.8,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-55132&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-32006&#34;,&#xA;                &#34;title&#34; : &#34;The use of `module.constructor.createRequire()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.\n\nThis vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x, and, 20.x.\n\nPlease note that at the time this CVE was issued, the policy is an experimental feature of Node.js.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32006&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libbrotli@1.0.9-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=brotli-1.0.9-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6176&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6176&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2023-39332&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-39332&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/nodejs-full-i18n@16.19.1-1.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=nodejs-16.19.1-1.el9_2.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2023-39332&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-39332&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-32006&#34;,&#xA;              &#34;title&#34; : &#34;The use of `module.constructor.createRequire()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.\n\nThis vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x, and, 20.x.\n\nPlease note that at the time this CVE was issued, the policy is an experimental feature of Node.js.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-32006&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2022-4904&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.6,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2022-4904&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2022-35255&#34;,&#xA;              &#34;title&#34; : &#34;A weak randomness in WebCrypto keygen vulnerability exists in Node.js 18 due to a change with EntropySource() in SecretKeyGenTraits::DoKeyGen() in src/crypto/crypto_keygen.cc. There are two problems with this: 1) It does not check the return value, it assumes EntropySource() always succeeds, but it can (and sometimes will) fail. 2) The random data returned byEntropySource() may not be cryptographically strong and therefore not suitable as keying material.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.2,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2022-35255&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-32002&#34;,&#xA;              &#34;title&#34; : &#34;The use of `Module._load()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.\n\nThis vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x.\n\nPlease note that at the time this CVE was issued, the policy is an experimental feature of Node.js.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.1,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-32002&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-21892&#34;,&#xA;              &#34;title&#34; : &#34;On Linux, Node.js ignores certain environment variables if those may have been set by an unprivileged user while the process is running with elevated privileges with the only exception of CAP_NET_BIND_SERVICE.\nDue to a bug in the implementation of this exception, Node.js incorrectly applies this exception even when certain other capabilities have been set.\nThis allows unprivileged users to inject code that inherits the process&#39;s elevated privileges.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.1,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-21892&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-21896&#34;,&#xA;              &#34;title&#34; : &#34;The permission model protects itself against path traversal attacks by calling path.resolve() on any paths given by the user. If the path is to be treated as a Buffer, the implementation uses Buffer.from() to obtain a Buffer from the result of path.resolve(). By monkey-patching Buffer internals, namely, Buffer.prototype.utf8Write, the application can modify the result of path.resolve(), which leads to a path traversal vulnerability.\nThis vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21.\nPlease note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.9,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-21896&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-23083&#34;,&#xA;              &#34;title&#34; : &#34;With the aid of the diagnostics_channel utility, an event can be hooked into whenever a worker thread is created. This is not limited only to workers but also exposes internal workers, where an instance of them can be fetched, and its constructor can be grabbed and reinstated for malicious usage. \r\n\r\nThis vulnerability affects Permission Model users (--permission) on Node.js v20, v22, and v23.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.7,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-23083&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;              &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.7,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2021-35065&#34;,&#xA;              &#34;title&#34; : &#34;The glob-parent package before 6.0.1 for Node.js allows ReDoS (regular expression denial of service) attacks against the enclosure regular expression.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2021-35065&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2022-25881&#34;,&#xA;              &#34;title&#34; : &#34;This affects versions of the package http-cache-semantics before 4.1.1. The issue can be exploited via malicious request header values sent to a server, when that server reads the cache policy from the request using this library.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2022-25881&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2022-25883&#34;,&#xA;              &#34;title&#34; : &#34;Versions of the package semver before 7.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.\r\r\r&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2022-25883&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2022-3517&#34;,&#xA;              &#34;title&#34; : &#34;A vulnerability was found in the minimatch package. This flaw allows a Regular Expression Denial of Service (ReDoS) when calling the braceExpand function with specific arguments, resulting in a Denial of Service.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2022-3517&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2022-43548&#34;,&#xA;              &#34;title&#34; : &#34;A OS Command Injection vulnerability exists in Node.js versions &lt;14.21.1, &lt;16.18.1, &lt;18.12.1, &lt;19.0.1 due to an insufficient IsAllowedHost check that can easily be bypassed because IsIPAddress does not properly check if an IP address is invalid before making DBS requests allowing rebinding attacks.The fix for this issue in https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212 was incomplete and this new CVE is to complete the fix.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2022-43548&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-23918&#34;,&#xA;              &#34;title&#34; : &#34;A privilege escalation vulnerability exists in Node.js &lt;19.6.1, &lt;18.14.1, &lt;16.19.1 and &lt;14.21.3 that made it possible to bypass the experimental Permissions (https://nodejs.org/api/permissions.html) feature in Node.js and access non authorized modules by using process.mainModule.require(). This only affects users who had enabled the experimental permissions option with --experimental-policy.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-23918&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-23919&#34;,&#xA;              &#34;title&#34; : &#34;A cryptographic vulnerability exists in Node.js &lt;19.2.0, &lt;18.14.1, &lt;16.19.1, &lt;14.21.3 that in some cases did does not clear the OpenSSL error stack after operations that may set it. This may lead to false positive errors during subsequent cryptographic operations that happen to be on the same thread. This in turn could be used to cause a denial of service.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-23919&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-24807&#34;,&#xA;              &#34;title&#34; : &#34;Undici vulnerable to Regular Expression Denial of Service in Headers&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-24807&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-30581&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-30581&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-30590&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-30590&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-32067&#34;,&#xA;              &#34;title&#34; : &#34;0-byte UDP payload DoS in c-ares&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-32067&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-32559&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-32559&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-38552&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-38552&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-39331&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-39331&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-22019&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-22019&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-27983&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-27983&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-23166&#34;,&#xA;              &#34;title&#34; : &#34;The C++ method SignTraits::DeriveBits() may incorrectly call ThrowException() based on user-supplied inputs when executing in a background thread, crashing the Node.js process. Such cryptographic operations are commonly applied to untrusted inputs. Thus, this mechanism potentially allows an adversary to remotely crash a Node.js runtime.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-23166&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-59465&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-59465&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-1526&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-1526&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-1528&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-1528&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-21710&#34;,&#xA;              &#34;title&#34; : &#34;A flaw in Node.js HTTP request handling causes an uncaught `TypeError` when a request is received with a header named `__proto__` and the application accesses `req.headersDistinct`.\r\n\r\nWhen this occurs, `dest[\&#34;__proto__\&#34;]` resolves to `Object.prototype` rather than `undefined`, causing `.push()` to be called on a non-array. This exception is thrown synchronously inside a property getter and cannot be intercepted by `error` event listeners, meaning it cannot be handled without wrapping every `req.headersDistinct` access in a `try/catch`.\r\n\r\n* This vulnerability affects all Node.js HTTP servers on **20.x, 22.x, 24.x, and v25.x**&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-21710&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-2229&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-2229&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-27135&#34;,&#xA;              &#34;title&#34; : &#34;nghttp2 Denial of service: Assertion failure due to the missing state validation&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-27135&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-22017&#34;,&#xA;              &#34;title&#34; : &#34;setuid() does not affect libuv&#39;s internal io_uring operations if initialized before the call to setuid().\nThis allows the process to perform privileged operations despite presumably having dropped such privileges through a call to setuid().\nThis vulnerability affects all users using version greater or equal than Node.js 18.18.0, Node.js 20.4.0 and Node.js 21.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.3,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-22017&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-3277&#34;,&#xA;              &#34;title&#34; : &#34;An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.3,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-3277&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-1525&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.3,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-1525&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-55130&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.1,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-55130&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-55131&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.1,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-55131&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-30589&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.0,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-30589&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-31498&#34;,&#xA;              &#34;title&#34; : &#34;c-ares has a use-after-free in read_answers()&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.0,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-31498&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-22150&#34;,&#xA;              &#34;title&#34; : &#34;Undici Uses Insufficiently Random Values&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.8,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-22150&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-21891&#34;,&#xA;              &#34;title&#34; : &#34;Node.js depends on multiple built-in utility functions to normalize paths provided to node:fs functions, which can be overwitten with user-defined implementations leading to filesystem permission model bypass through path traversal attack.\nThis vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21.\nPlease note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.6,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-21891&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2022-35256&#34;,&#xA;              &#34;title&#34; : &#34;The llhttp parser in the http module in Node v18.7.0 does not correctly handle header fields that are not terminated with CLRF. This may result in HTTP Request Smuggling.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2022-35256&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-23936&#34;,&#xA;              &#34;title&#34; : &#34;CRLF Injection in Nodejs ‘undici’ via host&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-23936&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-22020&#34;,&#xA;              &#34;title&#34; : &#34;A security flaw in Node.js  allows a bypass of network import restrictions.\nBy embedding non-network imports in data URLs, an attacker can execute arbitrary code, compromising system security.\nVerified on various platforms, the vulnerability is mitigated by forbidding data URLs in network imports.\nExploiting this flaw can violate network import security, posing a risk to developers and servers.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-22020&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-22025&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-22025&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-28863&#34;,&#xA;              &#34;title&#34; : &#34;node-tar vulnerable to denial of service while parsing a tar file due to lack of folders count validation&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-28863&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-23167&#34;,&#xA;              &#34;title&#34; : &#34;A flaw in Node.js 20&#39;s HTTP parser allows improper termination of HTTP/1 headers using `\\r\\n\\rX` instead of the required `\\r\\n\\r\\n`.\nThis inconsistency enables request smuggling, allowing attackers to bypass proxy-based access controls and submit unauthorized requests.\n\nThe issue was resolved by upgrading `llhttp` to version 9, which enforces correct header termination.\n\nImpact:\n* This vulnerability affects only Node.js 20.x users prior to the `llhttp` v9 upgrade.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-23167&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-1527&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-1527&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-21712&#34;,&#xA;              &#34;title&#34; : &#34;A flaw in Node.js URL processing causes an assertion failure in native code when `url.format()` is called with a malformed internationalized domain name (IDN) containing invalid characters, crashing the Node.js process.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-21712&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-25547&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-25547&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-26996&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-26996&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-27904&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-27904&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-27982&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.1,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-27982&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-31147&#34;,&#xA;              &#34;title&#34; : &#34;Insufficient randomness in generation of DNS query IDs in c-ares&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-31147&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-46809&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-46809&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-59466&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-59466&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-21637&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-21637&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-21713&#34;,&#xA;              &#34;title&#34; : &#34;A flaw in Node.js HMAC verification uses a non-constant-time comparison when validating user-provided signatures, potentially leaking timing information proportional to the number of matching bytes. Under certain threat models where high-resolution timing measurements are possible, this behavior could be exploited as a timing oracle to infer HMAC values.\r\n\r\nNode.js already provides timing-safe comparison primitives used elsewhere in the codebase, indicating this is an oversight rather than an intentional design decision.\r\n\r\nThis vulnerability affects **20.x, 22.x, 24.x, and 25.x**.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-21713&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-21717&#34;,&#xA;              &#34;title&#34; : &#34;A flaw in V8&#39;s string hashing mechanism causes integer-like strings to be hashed to their numeric value, making hash collisions trivially predictable. By crafting a request that causes many such collisions in V8&#39;s internal string table, an attacker can significantly degrade performance of the Node.js process.\r\n\r\nThe most common trigger is any endpoint that calls `JSON.parse()` on attacker-controlled input, as JSON parsing automatically internalizes short strings into the affected hash table.\r\n\r\nThis vulnerability affects **20.x, 22.x, 24.x, and 25.x**.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-21717&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-2581&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-2581&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-31130&#34;,&#xA;              &#34;title&#34; : &#34;Buffer Underwrite in ares_inet_net_pton()&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.7,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-31130&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-30588&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-30588&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-39333&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-39333&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-28182&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-28182&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-23085&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-23085&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-21714&#34;,&#xA;              &#34;title&#34; : &#34;A memory leak occurs in Node.js HTTP/2 servers when a client sends WINDOW_UPDATE frames on stream 0 (connection-level) that cause the flow control window to exceed the maximum value of 2³¹-1. The server correctly sends a GOAWAY frame, but the Http2Session object is never cleaned up.\r\n\r\nThis vulnerability affects HTTP2 users on Node.js 20, 22, 24 and 25.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-21714&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-21711&#34;,&#xA;              &#34;title&#34; : &#34;A flaw in Node.js Permission Model network enforcement leaves Unix Domain Socket (UDS) server operations without the required permission checks, while all comparable network paths correctly enforce them.\r\n\r\nAs a result, code running under `--permission` without `--allow-net` can create and expose local IPC endpoints, allowing communication with other processes on the same host outside of the intended network restriction boundary.\r\n\r\nThis vulnerability affects Node.js **25.x** processes using the Permission Model where `--allow-net` is intentionally omitted to restrict network access. Note that `--allow-net` is currently an experimental feature.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.2,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-21711&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-21890&#34;,&#xA;              &#34;title&#34; : &#34;The Node.js Permission Model does not clarify in the documentation that wildcards should be only used as the last character of a file path. For example:\n```\n --allow-fs-read=/home/node/.ssh/*.pub\n```\n\nwill ignore `pub` and give access to everything after `.ssh/`.\n\nThis misleading documentation affects all users using the experimental permission model in Node.js 20 and Node.js 21.\n\nPlease note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.0,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-21890&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-25629&#34;,&#xA;              &#34;title&#34; : &#34;c-ares out of bounds read in ares__read_line()&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 4.4,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-25629&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-23920&#34;,&#xA;              &#34;title&#34; : &#34;An untrusted search path vulnerability exists in Node.js. &lt;19.6.1, &lt;18.14.1, &lt;16.19.1, and &lt;14.21.3 that could allow an attacker to search and potentially load ICU data when running with elevated privileges.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 4.2,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-23920&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-45143&#34;,&#xA;              &#34;title&#34; : &#34;Undici&#39;s cookie header not cleared on cross-origin redirect in fetch&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 3.9,&#xA;              &#34;severity&#34; : &#34;LOW&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-45143&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-36137&#34;,&#xA;              &#34;title&#34; : &#34;A vulnerability has been identified in Node.js, affecting users of the experimental permission model when the --allow-fs-write flag is used.\r\n\r\nNode.js Permission Model do not operate on file descriptors, however, operations such as fs.fchown or fs.fchmod can use a \&#34;read-only\&#34; file descriptor to change the owner and permissions of a file.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 3.9,&#xA;              &#34;severity&#34; : &#34;LOW&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-36137&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-21716&#34;,&#xA;              &#34;title&#34; : &#34;An incomplete fix for CVE-2024-36137 leaves `FileHandle.chmod()` and `FileHandle.chown()` in the promises API without the required permission checks, while their callback-based equivalents (`fs.fchmod()`, `fs.fchown()`) were correctly patched.\r\n\r\nAs a result, code running under `--permission` with restricted `--allow-fs-write` can still use promise-based `FileHandle` methods to modify file permissions and ownership on already-open file descriptors, bypassing the intended write restrictions.\r\n\r\nThis vulnerability affects **20.x, 22.x, 24.x, and 25.x** processes using the Permission Model where `--allow-fs-write` is intentionally restricted.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 3.8,&#xA;              &#34;severity&#34; : &#34;LOW&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-21716&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-31124&#34;,&#xA;              &#34;title&#34; : &#34;AutoTools does not set CARES_RANDOM_FILE during cross compilation&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 3.7,&#xA;              &#34;severity&#34; : &#34;LOW&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-31124&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-23165&#34;,&#xA;              &#34;title&#34; : &#34;In Node.js, the `ReadFileUtf8` internal binding leaks memory due to a corrupted pointer in `uv_fs_s.file`: a UTF-16 path buffer is allocated but subsequently overwritten when the file descriptor is set. This results in an unrecoverable memory leak on every call. Repeated use can cause unbounded memory growth, leading to a denial of service.\r\n\r\nImpact:\r\n* This vulnerability affects APIs relying on `ReadFileUtf8` on Node.js release lines: v20 and v22.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 3.7,&#xA;              &#34;severity&#34; : &#34;LOW&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-23165&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-21715&#34;,&#xA;              &#34;title&#34; : &#34;A flaw in Node.js Permission Model filesystem enforcement leaves `fs.realpathSync.native()` without the required read permission checks, while all comparable filesystem functions correctly enforce them.\r\n\r\nAs a result, code running under `--permission` with restricted `--allow-fs-read` can still use `fs.realpathSync.native()` to check file existence, resolve symlink targets, and enumerate filesystem paths outside of permitted directories.\r\n\r\nThis vulnerability affects **20.x, 22.x, 24.x, and 25.x** processes using the Permission Model where `--allow-fs-read` is intentionally restricted.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 3.3,&#xA;              &#34;severity&#34; : &#34;LOW&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-21715&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-22018&#34;,&#xA;              &#34;title&#34; : &#34;A vulnerability has been identified in Node.js, affecting users of the experimental permission model when the --allow-fs-read flag is used.\nThis flaw arises from an inadequate permission model that fails to restrict file stats through the fs.lstat API. As a result, malicious actors can retrieve stats from files that they do not have explicit read access to.\nThis vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21.\nPlease note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 2.9,&#xA;              &#34;severity&#34; : &#34;LOW&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-22018&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-55132&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 2.8,&#xA;              &#34;severity&#34; : &#34;LOW&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-55132&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/nodejs@16.19.1-1.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=nodejs-16.19.1-1.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-39332&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39332&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32006&#34;,&#xA;                &#34;title&#34; : &#34;The use of `module.constructor.createRequire()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.\n\nThis vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x, and, 20.x.\n\nPlease note that at the time this CVE was issued, the policy is an experimental feature of Node.js.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32006&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-4904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-4904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-35255&#34;,&#xA;                &#34;title&#34; : &#34;A weak randomness in WebCrypto keygen vulnerability exists in Node.js 18 due to a change with EntropySource() in SecretKeyGenTraits::DoKeyGen() in src/crypto/crypto_keygen.cc. There are two problems with this: 1) It does not check the return value, it assumes EntropySource() always succeeds, but it can (and sometimes will) fail. 2) The random data returned byEntropySource() may not be cryptographically strong and therefore not suitable as keying material.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.2,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-35255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32002&#34;,&#xA;                &#34;title&#34; : &#34;The use of `Module._load()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.\n\nThis vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x.\n\nPlease note that at the time this CVE was issued, the policy is an experimental feature of Node.js.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32002&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-21892&#34;,&#xA;                &#34;title&#34; : &#34;On Linux, Node.js ignores certain environment variables if those may have been set by an unprivileged user while the process is running with elevated privileges with the only exception of CAP_NET_BIND_SERVICE.\nDue to a bug in the implementation of this exception, Node.js incorrectly applies this exception even when certain other capabilities have been set.\nThis allows unprivileged users to inject code that inherits the process&#39;s elevated privileges.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-21892&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-21896&#34;,&#xA;                &#34;title&#34; : &#34;The permission model protects itself against path traversal attacks by calling path.resolve() on any paths given by the user. If the path is to be treated as a Buffer, the implementation uses Buffer.from() to obtain a Buffer from the result of path.resolve(). By monkey-patching Buffer internals, namely, Buffer.prototype.utf8Write, the application can modify the result of path.resolve(), which leads to a path traversal vulnerability.\nThis vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21.\nPlease note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.9,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-21896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-23083&#34;,&#xA;                &#34;title&#34; : &#34;With the aid of the diagnostics_channel utility, an event can be hooked into whenever a worker thread is created. This is not limited only to workers but also exposes internal workers, where an instance of them can be fetched, and its constructor can be grabbed and reinstated for malicious usage. \r\n\r\nThis vulnerability affects Permission Model users (--permission) on Node.js v20, v22, and v23.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-23083&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35065&#34;,&#xA;                &#34;title&#34; : &#34;The glob-parent package before 6.0.1 for Node.js allows ReDoS (regular expression denial of service) attacks against the enclosure regular expression.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35065&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-25881&#34;,&#xA;                &#34;title&#34; : &#34;This affects versions of the package http-cache-semantics before 4.1.1. The issue can be exploited via malicious request header values sent to a server, when that server reads the cache policy from the request using this library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-25881&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-25883&#34;,&#xA;                &#34;title&#34; : &#34;Versions of the package semver before 7.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.\r\r\r&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-25883&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-3517&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the minimatch package. This flaw allows a Regular Expression Denial of Service (ReDoS) when calling the braceExpand function with specific arguments, resulting in a Denial of Service.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-3517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-43548&#34;,&#xA;                &#34;title&#34; : &#34;A OS Command Injection vulnerability exists in Node.js versions &lt;14.21.1, &lt;16.18.1, &lt;18.12.1, &lt;19.0.1 due to an insufficient IsAllowedHost check that can easily be bypassed because IsIPAddress does not properly check if an IP address is invalid before making DBS requests allowing rebinding attacks.The fix for this issue in https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212 was incomplete and this new CVE is to complete the fix.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-43548&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-23918&#34;,&#xA;                &#34;title&#34; : &#34;A privilege escalation vulnerability exists in Node.js &lt;19.6.1, &lt;18.14.1, &lt;16.19.1 and &lt;14.21.3 that made it possible to bypass the experimental Permissions (https://nodejs.org/api/permissions.html) feature in Node.js and access non authorized modules by using process.mainModule.require(). This only affects users who had enabled the experimental permissions option with --experimental-policy.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-23918&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-23919&#34;,&#xA;                &#34;title&#34; : &#34;A cryptographic vulnerability exists in Node.js &lt;19.2.0, &lt;18.14.1, &lt;16.19.1, &lt;14.21.3 that in some cases did does not clear the OpenSSL error stack after operations that may set it. This may lead to false positive errors during subsequent cryptographic operations that happen to be on the same thread. This in turn could be used to cause a denial of service.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-23919&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24807&#34;,&#xA;                &#34;title&#34; : &#34;Undici vulnerable to Regular Expression Denial of Service in Headers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24807&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-30581&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-30581&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-30590&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-30590&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32067&#34;,&#xA;                &#34;title&#34; : &#34;0-byte UDP payload DoS in c-ares&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32067&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32559&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38552&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38552&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39331&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39331&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-22019&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-22019&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-27983&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-27983&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-23166&#34;,&#xA;                &#34;title&#34; : &#34;The C++ method SignTraits::DeriveBits() may incorrectly call ThrowException() based on user-supplied inputs when executing in a background thread, crashing the Node.js process. Such cryptographic operations are commonly applied to untrusted inputs. Thus, this mechanism potentially allows an adversary to remotely crash a Node.js runtime.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-23166&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59465&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1526&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1526&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1528&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1528&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-21710&#34;,&#xA;                &#34;title&#34; : &#34;A flaw in Node.js HTTP request handling causes an uncaught `TypeError` when a request is received with a header named `__proto__` and the application accesses `req.headersDistinct`.\r\n\r\nWhen this occurs, `dest[\&#34;__proto__\&#34;]` resolves to `Object.prototype` rather than `undefined`, causing `.push()` to be called on a non-array. This exception is thrown synchronously inside a property getter and cannot be intercepted by `error` event listeners, meaning it cannot be handled without wrapping every `req.headersDistinct` access in a `try/catch`.\r\n\r\n* This vulnerability affects all Node.js HTTP servers on **20.x, 22.x, 24.x, and v25.x**&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-21710&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2229&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2229&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27135&#34;,&#xA;                &#34;title&#34; : &#34;nghttp2 Denial of service: Assertion failure due to the missing state validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27135&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-22017&#34;,&#xA;                &#34;title&#34; : &#34;setuid() does not affect libuv&#39;s internal io_uring operations if initialized before the call to setuid().\nThis allows the process to perform privileged operations despite presumably having dropped such privileges through a call to setuid().\nThis vulnerability affects all users using version greater or equal than Node.js 18.18.0, Node.js 20.4.0 and Node.js 21.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-22017&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3277&#34;,&#xA;                &#34;title&#34; : &#34;An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3277&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1525&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1525&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-55130&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-55130&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-55131&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-55131&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-30589&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-30589&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-31498&#34;,&#xA;                &#34;title&#34; : &#34;c-ares has a use-after-free in read_answers()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31498&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22150&#34;,&#xA;                &#34;title&#34; : &#34;Undici Uses Insufficiently Random Values&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22150&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-21891&#34;,&#xA;                &#34;title&#34; : &#34;Node.js depends on multiple built-in utility functions to normalize paths provided to node:fs functions, which can be overwitten with user-defined implementations leading to filesystem permission model bypass through path traversal attack.\nThis vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21.\nPlease note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-21891&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-35256&#34;,&#xA;                &#34;title&#34; : &#34;The llhttp parser in the http module in Node v18.7.0 does not correctly handle header fields that are not terminated with CLRF. This may result in HTTP Request Smuggling.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-35256&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-23936&#34;,&#xA;                &#34;title&#34; : &#34;CRLF Injection in Nodejs ‘undici’ via host&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-23936&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-22020&#34;,&#xA;                &#34;title&#34; : &#34;A security flaw in Node.js  allows a bypass of network import restrictions.\nBy embedding non-network imports in data URLs, an attacker can execute arbitrary code, compromising system security.\nVerified on various platforms, the vulnerability is mitigated by forbidding data URLs in network imports.\nExploiting this flaw can violate network import security, posing a risk to developers and servers.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-22020&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-22025&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-22025&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28863&#34;,&#xA;                &#34;title&#34; : &#34;node-tar vulnerable to denial of service while parsing a tar file due to lack of folders count validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28863&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-23167&#34;,&#xA;                &#34;title&#34; : &#34;A flaw in Node.js 20&#39;s HTTP parser allows improper termination of HTTP/1 headers using `\\r\\n\\rX` instead of the required `\\r\\n\\r\\n`.\nThis inconsistency enables request smuggling, allowing attackers to bypass proxy-based access controls and submit unauthorized requests.\n\nThe issue was resolved by upgrading `llhttp` to version 9, which enforces correct header termination.\n\nImpact:\n* This vulnerability affects only Node.js 20.x users prior to the `llhttp` v9 upgrade.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-23167&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-21712&#34;,&#xA;                &#34;title&#34; : &#34;A flaw in Node.js URL processing causes an assertion failure in native code when `url.format()` is called with a malformed internationalized domain name (IDN) containing invalid characters, crashing the Node.js process.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-21712&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-25547&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-25547&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-26996&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-26996&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-27982&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-27982&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-31147&#34;,&#xA;                &#34;title&#34; : &#34;Insufficient randomness in generation of DNS query IDs in c-ares&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31147&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-46809&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-46809&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59466&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-21637&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-21637&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-21713&#34;,&#xA;                &#34;title&#34; : &#34;A flaw in Node.js HMAC verification uses a non-constant-time comparison when validating user-provided signatures, potentially leaking timing information proportional to the number of matching bytes. Under certain threat models where high-resolution timing measurements are possible, this behavior could be exploited as a timing oracle to infer HMAC values.\r\n\r\nNode.js already provides timing-safe comparison primitives used elsewhere in the codebase, indicating this is an oversight rather than an intentional design decision.\r\n\r\nThis vulnerability affects **20.x, 22.x, 24.x, and 25.x**.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-21713&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-21717&#34;,&#xA;                &#34;title&#34; : &#34;A flaw in V8&#39;s string hashing mechanism causes integer-like strings to be hashed to their numeric value, making hash collisions trivially predictable. By crafting a request that causes many such collisions in V8&#39;s internal string table, an attacker can significantly degrade performance of the Node.js process.\r\n\r\nThe most common trigger is any endpoint that calls `JSON.parse()` on attacker-controlled input, as JSON parsing automatically internalizes short strings into the affected hash table.\r\n\r\nThis vulnerability affects **20.x, 22.x, 24.x, and 25.x**.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-21717&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2581&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2581&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-31130&#34;,&#xA;                &#34;title&#34; : &#34;Buffer Underwrite in ares_inet_net_pton()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31130&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-30588&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-30588&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39333&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39333&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28182&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28182&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-23085&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-23085&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-21714&#34;,&#xA;                &#34;title&#34; : &#34;A memory leak occurs in Node.js HTTP/2 servers when a client sends WINDOW_UPDATE frames on stream 0 (connection-level) that cause the flow control window to exceed the maximum value of 2³¹-1. The server correctly sends a GOAWAY frame, but the Http2Session object is never cleaned up.\r\n\r\nThis vulnerability affects HTTP2 users on Node.js 20, 22, 24 and 25.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-21714&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-21711&#34;,&#xA;                &#34;title&#34; : &#34;A flaw in Node.js Permission Model network enforcement leaves Unix Domain Socket (UDS) server operations without the required permission checks, while all comparable network paths correctly enforce them.\r\n\r\nAs a result, code running under `--permission` without `--allow-net` can create and expose local IPC endpoints, allowing communication with other processes on the same host outside of the intended network restriction boundary.\r\n\r\nThis vulnerability affects Node.js **25.x** processes using the Permission Model where `--allow-net` is intentionally omitted to restrict network access. Note that `--allow-net` is currently an experimental feature.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-21711&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-21890&#34;,&#xA;                &#34;title&#34; : &#34;The Node.js Permission Model does not clarify in the documentation that wildcards should be only used as the last character of a file path. For example:\n```\n --allow-fs-read=/home/node/.ssh/*.pub\n```\n\nwill ignore `pub` and give access to everything after `.ssh/`.\n\nThis misleading documentation affects all users using the experimental permission model in Node.js 20 and Node.js 21.\n\nPlease note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-21890&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-25629&#34;,&#xA;                &#34;title&#34; : &#34;c-ares out of bounds read in ares__read_line()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-25629&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-23920&#34;,&#xA;                &#34;title&#34; : &#34;An untrusted search path vulnerability exists in Node.js. &lt;19.6.1, &lt;18.14.1, &lt;16.19.1, and &lt;14.21.3 that could allow an attacker to search and potentially load ICU data when running with elevated privileges.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-23920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-45143&#34;,&#xA;                &#34;title&#34; : &#34;Undici&#39;s cookie header not cleared on cross-origin redirect in fetch&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.9,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-45143&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-36137&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability has been identified in Node.js, affecting users of the experimental permission model when the --allow-fs-write flag is used.\r\n\r\nNode.js Permission Model do not operate on file descriptors, however, operations such as fs.fchown or fs.fchmod can use a \&#34;read-only\&#34; file descriptor to change the owner and permissions of a file.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.9,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-36137&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-21716&#34;,&#xA;                &#34;title&#34; : &#34;An incomplete fix for CVE-2024-36137 leaves `FileHandle.chmod()` and `FileHandle.chown()` in the promises API without the required permission checks, while their callback-based equivalents (`fs.fchmod()`, `fs.fchown()`) were correctly patched.\r\n\r\nAs a result, code running under `--permission` with restricted `--allow-fs-write` can still use promise-based `FileHandle` methods to modify file permissions and ownership on already-open file descriptors, bypassing the intended write restrictions.\r\n\r\nThis vulnerability affects **20.x, 22.x, 24.x, and 25.x** processes using the Permission Model where `--allow-fs-write` is intentionally restricted.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.8,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-21716&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-31124&#34;,&#xA;                &#34;title&#34; : &#34;AutoTools does not set CARES_RANDOM_FILE during cross compilation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31124&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-23165&#34;,&#xA;                &#34;title&#34; : &#34;In Node.js, the `ReadFileUtf8` internal binding leaks memory due to a corrupted pointer in `uv_fs_s.file`: a UTF-16 path buffer is allocated but subsequently overwritten when the file descriptor is set. This results in an unrecoverable memory leak on every call. Repeated use can cause unbounded memory growth, leading to a denial of service.\r\n\r\nImpact:\r\n* This vulnerability affects APIs relying on `ReadFileUtf8` on Node.js release lines: v20 and v22.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-23165&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-21715&#34;,&#xA;                &#34;title&#34; : &#34;A flaw in Node.js Permission Model filesystem enforcement leaves `fs.realpathSync.native()` without the required read permission checks, while all comparable filesystem functions correctly enforce them.\r\n\r\nAs a result, code running under `--permission` with restricted `--allow-fs-read` can still use `fs.realpathSync.native()` to check file existence, resolve symlink targets, and enumerate filesystem paths outside of permitted directories.\r\n\r\nThis vulnerability affects **20.x, 22.x, 24.x, and 25.x** processes using the Permission Model where `--allow-fs-read` is intentionally restricted.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-21715&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-22018&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability has been identified in Node.js, affecting users of the experimental permission model when the --allow-fs-read flag is used.\nThis flaw arises from an inadequate permission model that fails to restrict file stats through the fs.lstat API. As a result, malicious actors can retrieve stats from files that they do not have explicit read access to.\nThis vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21.\nPlease note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.9,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-22018&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-55132&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.8,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-55132&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-39332&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39332&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28390&#34;,&#xA;                &#34;title&#34; : &#34;Possible NULL Dereference When Processing CMS KeyTransportRecipientInfo&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28390&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9231&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9231&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28388&#34;,&#xA;                &#34;title&#34; : &#34;NULL Pointer Dereference When Processing a Delta CRL&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28388&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28389&#34;,&#xA;                &#34;title&#34; : &#34;Possible NULL Dereference When Processing CMS KeyAgreeRecipientInfo&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28389&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-31790&#34;,&#xA;                &#34;title&#34; : &#34;Incorrect Failure Handling in RSA KEM RSASVE Encapsulation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-31790&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-31789&#34;,&#xA;                &#34;title&#34; : &#34;Heap Buffer Overflow in Hexadecimal Conversion&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-31789&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28386&#34;,&#xA;                &#34;title&#34; : &#34;Out-of-bounds Read in AES-CFB-128 on X86-64 with AVX-512 Support&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28386&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28387&#34;,&#xA;                &#34;title&#34; : &#34;Potential Use-after-free in DANE Client Code&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28387&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.1,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2673&#34;,&#xA;                &#34;title&#34; : &#34;OpenSSL TLS 1.3 server may choose unexpected key agreement group&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.1,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2673&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/nodejs-libs@16.19.1-1.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=nodejs-16.19.1-1.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-32006&#34;,&#xA;                &#34;title&#34; : &#34;The use of `module.constructor.createRequire()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.\n\nThis vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x, and, 20.x.\n\nPlease note that at the time this CVE was issued, the policy is an experimental feature of Node.js.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32006&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-4904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-4904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32002&#34;,&#xA;                &#34;title&#34; : &#34;The use of `Module._load()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.\n\nThis vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x.\n\nPlease note that at the time this CVE was issued, the policy is an experimental feature of Node.js.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32002&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-23083&#34;,&#xA;                &#34;title&#34; : &#34;With the aid of the diagnostics_channel utility, an event can be hooked into whenever a worker thread is created. This is not limited only to workers but also exposes internal workers, where an instance of them can be fetched, and its constructor can be grabbed and reinstated for malicious usage. \r\n\r\nThis vulnerability affects Permission Model users (--permission) on Node.js v20, v22, and v23.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-23083&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-25881&#34;,&#xA;                &#34;title&#34; : &#34;This affects versions of the package http-cache-semantics before 4.1.1. The issue can be exploited via malicious request header values sent to a server, when that server reads the cache policy from the request using this library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-25881&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24807&#34;,&#xA;                &#34;title&#34; : &#34;Undici vulnerable to Regular Expression Denial of Service in Headers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24807&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-30581&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-30581&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-30590&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-30590&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32067&#34;,&#xA;                &#34;title&#34; : &#34;0-byte UDP payload DoS in c-ares&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32067&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32559&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-22019&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-22019&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-27983&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-27983&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-23166&#34;,&#xA;                &#34;title&#34; : &#34;The C++ method SignTraits::DeriveBits() may incorrectly call ThrowException() based on user-supplied inputs when executing in a background thread, crashing the Node.js process. Such cryptographic operations are commonly applied to untrusted inputs. Thus, this mechanism potentially allows an adversary to remotely crash a Node.js runtime.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-23166&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59465&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1526&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1526&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1528&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1528&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-21710&#34;,&#xA;                &#34;title&#34; : &#34;A flaw in Node.js HTTP request handling causes an uncaught `TypeError` when a request is received with a header named `__proto__` and the application accesses `req.headersDistinct`.\r\n\r\nWhen this occurs, `dest[\&#34;__proto__\&#34;]` resolves to `Object.prototype` rather than `undefined`, causing `.push()` to be called on a non-array. This exception is thrown synchronously inside a property getter and cannot be intercepted by `error` event listeners, meaning it cannot be handled without wrapping every `req.headersDistinct` access in a `try/catch`.\r\n\r\n* This vulnerability affects all Node.js HTTP servers on **20.x, 22.x, 24.x, and v25.x**&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-21710&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2229&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2229&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27135&#34;,&#xA;                &#34;title&#34; : &#34;nghttp2 Denial of service: Assertion failure due to the missing state validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27135&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3277&#34;,&#xA;                &#34;title&#34; : &#34;An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3277&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1525&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1525&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-55130&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-55130&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-55131&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-55131&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-30589&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-30589&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-31498&#34;,&#xA;                &#34;title&#34; : &#34;c-ares has a use-after-free in read_answers()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31498&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22150&#34;,&#xA;                &#34;title&#34; : &#34;Undici Uses Insufficiently Random Values&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22150&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-23936&#34;,&#xA;                &#34;title&#34; : &#34;CRLF Injection in Nodejs ‘undici’ via host&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-23936&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-22025&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-22025&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-21712&#34;,&#xA;                &#34;title&#34; : &#34;A flaw in Node.js URL processing causes an assertion failure in native code when `url.format()` is called with a malformed internationalized domain name (IDN) containing invalid characters, crashing the Node.js process.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-21712&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-25547&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-25547&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-26996&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-26996&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-27982&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-27982&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-31147&#34;,&#xA;                &#34;title&#34; : &#34;Insufficient randomness in generation of DNS query IDs in c-ares&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31147&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59466&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-21637&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-21637&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-21713&#34;,&#xA;                &#34;title&#34; : &#34;A flaw in Node.js HMAC verification uses a non-constant-time comparison when validating user-provided signatures, potentially leaking timing information proportional to the number of matching bytes. Under certain threat models where high-resolution timing measurements are possible, this behavior could be exploited as a timing oracle to infer HMAC values.\r\n\r\nNode.js already provides timing-safe comparison primitives used elsewhere in the codebase, indicating this is an oversight rather than an intentional design decision.\r\n\r\nThis vulnerability affects **20.x, 22.x, 24.x, and 25.x**.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-21713&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-21717&#34;,&#xA;                &#34;title&#34; : &#34;A flaw in V8&#39;s string hashing mechanism causes integer-like strings to be hashed to their numeric value, making hash collisions trivially predictable. By crafting a request that causes many such collisions in V8&#39;s internal string table, an attacker can significantly degrade performance of the Node.js process.\r\n\r\nThe most common trigger is any endpoint that calls `JSON.parse()` on attacker-controlled input, as JSON parsing automatically internalizes short strings into the affected hash table.\r\n\r\nThis vulnerability affects **20.x, 22.x, 24.x, and 25.x**.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-21717&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2581&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2581&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-31130&#34;,&#xA;                &#34;title&#34; : &#34;Buffer Underwrite in ares_inet_net_pton()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31130&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-30588&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-30588&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28182&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28182&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-23085&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-23085&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-21714&#34;,&#xA;                &#34;title&#34; : &#34;A memory leak occurs in Node.js HTTP/2 servers when a client sends WINDOW_UPDATE frames on stream 0 (connection-level) that cause the flow control window to exceed the maximum value of 2³¹-1. The server correctly sends a GOAWAY frame, but the Http2Session object is never cleaned up.\r\n\r\nThis vulnerability affects HTTP2 users on Node.js 20, 22, 24 and 25.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-21714&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-21711&#34;,&#xA;                &#34;title&#34; : &#34;A flaw in Node.js Permission Model network enforcement leaves Unix Domain Socket (UDS) server operations without the required permission checks, while all comparable network paths correctly enforce them.\r\n\r\nAs a result, code running under `--permission` without `--allow-net` can create and expose local IPC endpoints, allowing communication with other processes on the same host outside of the intended network restriction boundary.\r\n\r\nThis vulnerability affects Node.js **25.x** processes using the Permission Model where `--allow-net` is intentionally omitted to restrict network access. Note that `--allow-net` is currently an experimental feature.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-21711&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-25629&#34;,&#xA;                &#34;title&#34; : &#34;c-ares out of bounds read in ares__read_line()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-25629&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-23920&#34;,&#xA;                &#34;title&#34; : &#34;An untrusted search path vulnerability exists in Node.js. &lt;19.6.1, &lt;18.14.1, &lt;16.19.1, and &lt;14.21.3 that could allow an attacker to search and potentially load ICU data when running with elevated privileges.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-23920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-21716&#34;,&#xA;                &#34;title&#34; : &#34;An incomplete fix for CVE-2024-36137 leaves `FileHandle.chmod()` and `FileHandle.chown()` in the promises API without the required permission checks, while their callback-based equivalents (`fs.fchmod()`, `fs.fchown()`) were correctly patched.\r\n\r\nAs a result, code running under `--permission` with restricted `--allow-fs-write` can still use promise-based `FileHandle` methods to modify file permissions and ownership on already-open file descriptors, bypassing the intended write restrictions.\r\n\r\nThis vulnerability affects **20.x, 22.x, 24.x, and 25.x** processes using the Permission Model where `--allow-fs-write` is intentionally restricted.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.8,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-21716&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-31124&#34;,&#xA;                &#34;title&#34; : &#34;AutoTools does not set CARES_RANDOM_FILE during cross compilation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31124&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-23165&#34;,&#xA;                &#34;title&#34; : &#34;In Node.js, the `ReadFileUtf8` internal binding leaks memory due to a corrupted pointer in `uv_fs_s.file`: a UTF-16 path buffer is allocated but subsequently overwritten when the file descriptor is set. This results in an unrecoverable memory leak on every call. Repeated use can cause unbounded memory growth, leading to a denial of service.\r\n\r\nImpact:\r\n* This vulnerability affects APIs relying on `ReadFileUtf8` on Node.js release lines: v20 and v22.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-23165&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-21715&#34;,&#xA;                &#34;title&#34; : &#34;A flaw in Node.js Permission Model filesystem enforcement leaves `fs.realpathSync.native()` without the required read permission checks, while all comparable filesystem functions correctly enforce them.\r\n\r\nAs a result, code running under `--permission` with restricted `--allow-fs-read` can still use `fs.realpathSync.native()` to check file existence, resolve symlink targets, and enumerate filesystem paths outside of permitted directories.\r\n\r\nThis vulnerability affects **20.x, 22.x, 24.x, and 25.x** processes using the Permission Model where `--allow-fs-read` is intentionally restricted.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-21715&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-55132&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.8,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-55132&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-32006&#34;,&#xA;                &#34;title&#34; : &#34;The use of `module.constructor.createRequire()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.\n\nThis vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x, and, 20.x.\n\nPlease note that at the time this CVE was issued, the policy is an experimental feature of Node.js.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32006&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libbrotli@1.0.9-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=brotli-1.0.9-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6176&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6176&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2023-39332&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-39332&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-decorator@4.4.2-6.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-decorator-4.4.2-6.el9.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2023-2727&#34;,&#xA;              &#34;title&#34; : &#34;Bypassing policies imposed by the ImagePolicyWebhook admission plugin&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-2727&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-2728&#34;,&#xA;              &#34;title&#34; : &#34;Bypassing enforce mountable secrets policy imposed by the ServiceAccount admission plugin&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-2728&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-setuptools-53.0.0-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-47273&#34;,&#xA;                &#34;title&#34; : &#34;setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-47273&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5713&#34;,&#xA;                &#34;title&#34; : &#34;Out-of-bounds read/write during remote profiling and asyncio process introspection when connecting to malicious target&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5713&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13837&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13837&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4224&#34;,&#xA;                &#34;title&#34; : &#34;Stack overflow parsing XML with deeply nested DTD content models&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4224&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3644&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete control character validation in http.cookies&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3644&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12781&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12781&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3446&#34;,&#xA;                &#34;title&#34; : &#34;Base64 decoding stops at first padded quad by default&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15282&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15282&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1502&#34;,&#xA;                &#34;title&#34; : &#34;HTTP client proxy tunnel headers not validated for CR/LF&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1502&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2297&#34;,&#xA;                &#34;title&#34; : &#34;SourcelessFileLoader does not use io.open_code()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2297&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3479&#34;,&#xA;                &#34;title&#34; : &#34;pkgutil.get_data() does not enforce documented restrictions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3479&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13462&#34;,&#xA;                &#34;title&#34; : &#34;tarfile: Skip DIRTYPE normalization during GNU LONGNAME/LONGLINK handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=sqlite-3.34.1-6.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-7104&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3277&#34;,&#xA;                &#34;title&#34; : &#34;An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3277&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=expat-2.5.0-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28757&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45490&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8176&#34;,&#xA;                &#34;title&#34; : &#34;Libexpat: expat: improper restriction of xml entity expansion depth in libexpat&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45492&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45492&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50602&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59375&#34;,&#xA;                &#34;title&#34; : &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59375&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41080&#34;,&#xA;                &#34;title&#34; : &#34;libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41080&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-pip-21.2.3-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=lsof-4.94.0-3.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=krb5-1.20.1-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39975&#34;,&#xA;                &#34;title&#34; : &#34;kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26462&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37370&#34;,&#xA;                &#34;title&#34; : &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37370&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-36054&#34;,&#xA;                &#34;title&#34; : &#34;lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-36054&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37371&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37371&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24528&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24528&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26458&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26461&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26461&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3576&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3576&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=gmp-6.2.0-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/environment-modules@5.0.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=environment-modules-5.0.1-2.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/less@590-1.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=less-590-1.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-32487&#34;,&#xA;                &#34;title&#34; : &#34;less through 653 allows OS command execution via a newline character in the name of a file, because quoting is mishandled in filename.c. Exploitation typically requires use with attacker-controlled file names, such as the files extracted from an untrusted archive. Exploitation also requires the LESSOPEN environment variable, but this is set by default in many common cases.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-32487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-46663&#34;,&#xA;                &#34;title&#34; : &#34;In GNU Less before 609, crafted data can result in \&#34;less -R\&#34; not filtering ANSI escape sequences sent to the terminal.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-46663&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-48624&#34;,&#xA;                &#34;title&#34; : &#34;close_altfile in filename.c in less before 606 omits shell_quote calls for LESSCLOSE.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-48624&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-32487&#34;,&#xA;                &#34;title&#34; : &#34;less through 653 allows OS command execution via a newline character in the name of a file, because quoting is mishandled in filename.c. Exploitation typically requires use with attacker-controlled file names, such as the files extracted from an untrusted archive. Exploitation also requires the LESSOPEN environment variable, but this is set by default in many common cases.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-32487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/vim-filesystem@8.2.2637-20.el9_1?arch=noarch&amp;distro=rhel-9.2&amp;epoch=2&amp;upstream=vim-8.2.2637-20.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-34982&#34;,&#xA;                &#34;title&#34; : &#34;Vim modeline bypass via various options affects Vim &lt; 9.2.0276&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.2,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-34982&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-25749&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-25749&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-33412&#34;,&#xA;                &#34;title&#34; : &#34;Vim affected by Command injection via newline in glob()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-33412&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4752&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4752&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-3903&#34;,&#xA;                &#34;title&#34; : &#34;Heap-based Buffer Overflow in vim/vim&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-3903&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28417&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28417&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-53905&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-53905&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-53906&#34;,&#xA;                &#34;title&#34; : &#34;Vim has path traversal issue with zip.vim and special crafted zip archives&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-53906&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-34982&#34;,&#xA;                &#34;title&#34; : &#34;Vim modeline bypass via various options affects Vim &lt; 9.2.0276&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.2,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-34982&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libgcrypt-1.10.0-10.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2236&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2236&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41990&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 mishandles Dilithium signing. Writes to a static array lack a bounds check but do not use attacker-controlled data.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/systemd-libs@252-13.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=systemd-252-13.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4598&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4598&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/procps-ng@3.3.17-11.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=procps-ng-3.3.17-11.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-4016&#34;,&#xA;                &#34;title&#34; : &#34;Under some circumstances, this weakness allows a user who has access to run the “ps” utility on a machine, the ability to write almost unlimited amounts of unfiltered data into the process heap.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4016&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-4016&#34;,&#xA;                &#34;title&#34; : &#34;Under some circumstances, this weakness allows a user who has access to run the “ps” utility on a machine, the ability to write almost unlimited amounts of unfiltered data into the process heap.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4016&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gdb-10.2-10.el9.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2021-3826&#34;,&#xA;              &#34;title&#34; : &#34;Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2021-3826&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=krb5-1.20.1-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39975&#34;,&#xA;                &#34;title&#34; : &#34;kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26462&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37370&#34;,&#xA;                &#34;title&#34; : &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37370&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-36054&#34;,&#xA;                &#34;title&#34; : &#34;lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-36054&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37371&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37371&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24528&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24528&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26458&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26461&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26461&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3576&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3576&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-setuptools-53.0.0-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-47273&#34;,&#xA;                &#34;title&#34; : &#34;setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-47273&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=curl-7.76.1-23.el9_2.1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2398&#34;,&#xA;                &#34;title&#34; : &#34;HTTP/2 push headers memory-leak&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2398&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27536&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists libcurl &lt;8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27536&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28321&#34;,&#xA;                &#34;title&#34; : &#34;An improper certificate validation vulnerability exists in curl &lt;v8.1.0 in the way it supports matching of wildcard patterns when listed as \&#34;Subject Alternative Name\&#34; in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28321&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27538&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27538&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-46218&#34;,&#xA;                &#34;title&#34; : &#34;This flaw allows a malicious HTTP server to set \&#34;super cookies\&#34; in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl&#39;s function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-46218&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9086&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9086&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27533&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability in input validation exists in curl &lt;8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \&#34;telnet options\&#34; during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application&#39;s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27534&#34;,&#xA;                &#34;title&#34; : &#34;A path traversal vulnerability exists in curl &lt;8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27534&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28322&#34;,&#xA;                &#34;title&#34; : &#34;An information disclosure vulnerability exists in curl &lt;v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28322&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38546&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38546&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=sqlite-3.34.1-6.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-7104&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3277&#34;,&#xA;                &#34;title&#34; : &#34;An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3277&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glib2-2.68.4-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13601&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in in g_escape_uri_string()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-52533&#34;,&#xA;                &#34;title&#34; : &#34;gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing &#39;\\0&#39; character.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-52533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32611&#34;,&#xA;                &#34;title&#34; : &#34;G_variant_byteswap() can take a long time with some non-normal inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32611&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32665&#34;,&#xA;                &#34;title&#34; : &#34;Gvariant deserialisation does not match spec for non-normal data&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32665&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14512&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in glib gio attribute escaping causes heap buffer overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14512&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-29499&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29499&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14087&#34;,&#xA;                &#34;title&#34; : &#34;Glib: glib: buffer underflow in gvariant parser leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14087&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4373&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4373&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-34397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.8,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-34397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7039&#34;,&#xA;                &#34;title&#34; : &#34;Glib: buffer under-read on glib through glib/gfileutils.c via get_tmp_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7039&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0988&#34;,&#xA;                &#34;title&#34; : &#34;Glib: glib: denial of service via integer overflow in g_buffered_input_stream_peek()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0988&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13601&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in in g_escape_uri_string()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gnutls-3.7.6-20.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-0553&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: incomplete fix for cve-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0553&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0567&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0567&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32988&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls othername san export&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32988&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32990&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls certtool template parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6395&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: null pointer dereference in _gnutls_figure_common_ciphersuite()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5981&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12243&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: gnutls impacted by inefficient der decoding in libtasn1 leading to remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12243&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28834&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28834&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14831&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: gnutls: denial of service via excessive resource consumption during certificate verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14831&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32989&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls sct extension parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28835&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28835&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9820&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: stack-based buffer overflow in gnutls_pkcs11_token_init() function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9820&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-0553&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: incomplete fix for cve-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0553&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=nghttp2-1.43.0-5.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27135&#34;,&#xA;                &#34;title&#34; : &#34;nghttp2 Denial of service: Assertion failure due to the missing state validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27135&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28182&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28182&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=expat-2.5.0-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28757&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45490&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8176&#34;,&#xA;                &#34;title&#34; : &#34;Libexpat: expat: improper restriction of xml entity expansion depth in libexpat&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45492&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45492&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50602&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59375&#34;,&#xA;                &#34;title&#34; : &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59375&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41080&#34;,&#xA;                &#34;title&#34; : &#34;libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41080&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libicu@67.1-9.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=icu-67.1-9.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-5222&#34;,&#xA;                &#34;title&#34; : &#34;Icu: stack buffer overflow in the srbroot::addtag function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5222&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-5222&#34;,&#xA;                &#34;title&#34; : &#34;Icu: stack buffer overflow in the srbroot::addtag function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5222&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=gmp-6.2.0-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27456&#34;,&#xA;                &#34;title&#34; : &#34;util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27456&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3184&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: access control bypass due to improper hostname canonicalization&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3184&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-pip-21.2.3-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch&amp;distro=rhel-9.2&amp;upstream=dnf-4.14.0-5.el9_2.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libxml2-2.9.13-3.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49794&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: heap use after free (uaf) leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49794&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49796&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: type confusion leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56171&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56171&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24928&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24928&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7425&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: libxml2: heap use-after-free in libxslt caused by atype corruption in xmlattrptr&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-25062&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-25062&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32415&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32415&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49795&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: null pointer dereference leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6021&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6021&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7424&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: type confusion in xmlnode.psvi between stylesheet and source nodes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7424&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39615&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39615&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6732&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via crafted xsd-validated document&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6732&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9714&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9714&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1757&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: memory leak leading to local denial of service in xmllint interactive shell&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-49043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-49043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28484&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28484&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-29469&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the &#39;\\0&#39; value).&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0990&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via uncontrolled recursion in xml catalog processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32414&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32414&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-26434&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2, there is a possible out of bounds read due to a buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-26434&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0989&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: unbounded relaxng include recursion leading to stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0992&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via crafted xml catalogs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.9,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0992&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6170&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: stack buffer overflow in xmllint interactive shell command handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6170&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=krb5-1.20.1-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39975&#34;,&#xA;                &#34;title&#34; : &#34;kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26462&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37370&#34;,&#xA;                &#34;title&#34; : &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37370&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-36054&#34;,&#xA;                &#34;title&#34; : &#34;lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-36054&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37371&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37371&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24528&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24528&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26458&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26461&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26461&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3576&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3576&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-setuptools-53.0.0-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-47273&#34;,&#xA;                &#34;title&#34; : &#34;setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-47273&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5713&#34;,&#xA;                &#34;title&#34; : &#34;Out-of-bounds read/write during remote profiling and asyncio process introspection when connecting to malicious target&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5713&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13837&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13837&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4224&#34;,&#xA;                &#34;title&#34; : &#34;Stack overflow parsing XML with deeply nested DTD content models&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4224&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3644&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete control character validation in http.cookies&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3644&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12781&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12781&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3446&#34;,&#xA;                &#34;title&#34; : &#34;Base64 decoding stops at first padded quad by default&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15282&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15282&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1502&#34;,&#xA;                &#34;title&#34; : &#34;HTTP client proxy tunnel headers not validated for CR/LF&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1502&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2297&#34;,&#xA;                &#34;title&#34; : &#34;SourcelessFileLoader does not use io.open_code()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2297&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3479&#34;,&#xA;                &#34;title&#34; : &#34;pkgutil.get_data() does not enforce documented restrictions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3479&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13462&#34;,&#xA;                &#34;title&#34; : &#34;tarfile: Skip DIRTYPE normalization during GNU LONGNAME/LONGLINK handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcomps@0.1.18-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcomps-0.1.18-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-1312&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1312&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0980&#34;,&#xA;                &#34;title&#34; : &#34;Rubyipmi: red hat satellite: remote code execution in rubyipmi via malicious bmc username&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0980&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1207&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1207&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1530&#34;,&#xA;                &#34;title&#34; : &#34;Fog-kubevirt: fog-kubevirt: man-in-the-middle vulnerability due to disabled certificate validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1530&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1531&#34;,&#xA;                &#34;title&#34; : &#34;Foreman-kubevirt: foreman_kubevirt: man-in-the-middle due to insecure default ssl verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1531&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1961&#34;,&#xA;                &#34;title&#34; : &#34;Forman: foreman: remote code execution via command injection in websocket proxy&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-46877&#34;,&#xA;                &#34;title&#34; : &#34;jackson-databind 2.10.x through 2.12.x before 2.12.6 and 2.13.x before 2.13.1 allows attackers to cause a denial of service (2 GB transient heap usage per read) in uncommon situations involving JsonNode JDK serialization.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-46877&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14550&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14550&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6176&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1285&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1285&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68121&#34;,&#xA;                &#34;title&#34; : &#34;Unexpected session resumption in crypto/tls&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68121&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28863&#34;,&#xA;                &#34;title&#34; : &#34;node-tar vulnerable to denial of service while parsing a tar file due to lack of folders count validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28863&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4324&#34;,&#xA;                &#34;title&#34; : &#34;Rubygem-katello: katello: denial of service and potential information disclosure via sql injection&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4324&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-1312&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1312&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-libcomps@0.1.18-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcomps-0.1.18-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-1312&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1312&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0980&#34;,&#xA;                &#34;title&#34; : &#34;Rubyipmi: red hat satellite: remote code execution in rubyipmi via malicious bmc username&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0980&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1207&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1207&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1530&#34;,&#xA;                &#34;title&#34; : &#34;Fog-kubevirt: fog-kubevirt: man-in-the-middle vulnerability due to disabled certificate validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1530&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1531&#34;,&#xA;                &#34;title&#34; : &#34;Foreman-kubevirt: foreman_kubevirt: man-in-the-middle due to insecure default ssl verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1531&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1961&#34;,&#xA;                &#34;title&#34; : &#34;Forman: foreman: remote code execution via command injection in websocket proxy&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-46877&#34;,&#xA;                &#34;title&#34; : &#34;jackson-databind 2.10.x through 2.12.x before 2.12.6 and 2.13.x before 2.13.1 allows attackers to cause a denial of service (2 GB transient heap usage per read) in uncommon situations involving JsonNode JDK serialization.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-46877&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14550&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14550&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6176&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1285&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1285&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68121&#34;,&#xA;                &#34;title&#34; : &#34;Unexpected session resumption in crypto/tls&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68121&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28863&#34;,&#xA;                &#34;title&#34; : &#34;node-tar vulnerable to denial of service while parsing a tar file due to lack of folders count validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28863&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4324&#34;,&#xA;                &#34;title&#34; : &#34;Rubygem-katello: katello: denial of service and potential information disclosure via sql injection&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4324&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-1312&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1312&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gnupg2-2.3.3-2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-24882&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-24882&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68973&#34;,&#xA;                &#34;title&#34; : &#34;In GnuPG before 2.4.9, armor_filter in g10/armor.c has two increments of an index variable where one is intended, leading to an out-of-bounds write for crafted input. (For ExtendedLTS, 2.2.51 and later are fixed versions.)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68973&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68972&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68972&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-24882&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-24882&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=curl-7.76.1-23.el9_2.1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2398&#34;,&#xA;                &#34;title&#34; : &#34;HTTP/2 push headers memory-leak&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2398&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27536&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists libcurl &lt;8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27536&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28321&#34;,&#xA;                &#34;title&#34; : &#34;An improper certificate validation vulnerability exists in curl &lt;v8.1.0 in the way it supports matching of wildcard patterns when listed as \&#34;Subject Alternative Name\&#34; in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28321&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27538&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27538&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-46218&#34;,&#xA;                &#34;title&#34; : &#34;This flaw allows a malicious HTTP server to set \&#34;super cookies\&#34; in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl&#39;s function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-46218&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9086&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9086&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27533&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability in input validation exists in curl &lt;8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \&#34;telnet options\&#34; during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application&#39;s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27534&#34;,&#xA;                &#34;title&#34; : &#34;A path traversal vulnerability exists in curl &lt;8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27534&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28322&#34;,&#xA;                &#34;title&#34; : &#34;An information disclosure vulnerability exists in curl &lt;v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28322&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38546&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38546&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=curl-7.76.1-23.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2398&#34;,&#xA;                &#34;title&#34; : &#34;HTTP/2 push headers memory-leak&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2398&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27535&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl &lt;8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27536&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists libcurl &lt;8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27536&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28321&#34;,&#xA;                &#34;title&#34; : &#34;An improper certificate validation vulnerability exists in curl &lt;v8.1.0 in the way it supports matching of wildcard patterns when listed as \&#34;Subject Alternative Name\&#34; in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28321&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27538&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27538&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-46218&#34;,&#xA;                &#34;title&#34; : &#34;This flaw allows a malicious HTTP server to set \&#34;super cookies\&#34; in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl&#39;s function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-46218&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9086&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9086&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27533&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability in input validation exists in curl &lt;8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \&#34;telnet options\&#34; during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application&#39;s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27534&#34;,&#xA;                &#34;title&#34; : &#34;A path traversal vulnerability exists in curl &lt;8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27534&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28322&#34;,&#xA;                &#34;title&#34; : &#34;An information disclosure vulnerability exists in curl &lt;v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28322&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38546&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38546&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libarchive-3.5.3-4.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-5914&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5914&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4111&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: infinite loop denial of service in rar5 decompression via archive_read_data() in libarchive&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4111&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4424&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: libarchive: information disclosure via heap out-of-bounds read in rar archive processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4424&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5121&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: libarchive: arbitrary code execution via integer overflow in iso9660 image processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5121&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-60753&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-60753&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-57970&#34;,&#xA;                &#34;title&#34; : &#34;libarchive through 3.7.7 has a heap-based buffer over-read in header_gnu_longlink in archive_read_support_format_tar.c via a TAR archive because it mishandles truncation in the middle of a GNU long linkname.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-57970&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-25724&#34;,&#xA;                &#34;title&#34; : &#34;list_item_verbose in tar/util.c in libarchive through 3.7.7 does not check an strftime return value, which can lead to a denial of service or unspecified other impact via a crafted TAR archive that is read with a verbose value of 2. For example, the 100-byte buffer may not be sufficient for a custom locale.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-25724&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-5914&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5914&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glib2-2.68.4-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13601&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in in g_escape_uri_string()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-52533&#34;,&#xA;                &#34;title&#34; : &#34;gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing &#39;\\0&#39; character.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-52533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32611&#34;,&#xA;                &#34;title&#34; : &#34;G_variant_byteswap() can take a long time with some non-normal inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32611&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32665&#34;,&#xA;                &#34;title&#34; : &#34;Gvariant deserialisation does not match spec for non-normal data&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32665&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14512&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in glib gio attribute escaping causes heap buffer overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14512&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-29499&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29499&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14087&#34;,&#xA;                &#34;title&#34; : &#34;Glib: glib: buffer underflow in gvariant parser leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14087&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4373&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4373&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-34397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.8,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-34397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7039&#34;,&#xA;                &#34;title&#34; : &#34;Glib: buffer under-read on glib through glib/gfileutils.c via get_tmp_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7039&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0988&#34;,&#xA;                &#34;title&#34; : &#34;Glib: glib: denial of service via integer overflow in g_buffered_input_stream_peek()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0988&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13601&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in in g_escape_uri_string()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=sqlite-3.34.1-6.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-7104&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3277&#34;,&#xA;                &#34;title&#34; : &#34;An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3277&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=expat-2.5.0-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28757&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45490&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8176&#34;,&#xA;                &#34;title&#34; : &#34;Libexpat: expat: improper restriction of xml entity expansion depth in libexpat&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45492&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45492&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50602&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59375&#34;,&#xA;                &#34;title&#34; : &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59375&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41080&#34;,&#xA;                &#34;title&#34; : &#34;libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41080&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=nghttp2-1.43.0-5.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27135&#34;,&#xA;                &#34;title&#34; : &#34;nghttp2 Denial of service: Assertion failure due to the missing state validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27135&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28182&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28182&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gnutls-3.7.6-20.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-0553&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: incomplete fix for cve-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0553&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0567&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0567&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32988&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls othername san export&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32988&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32990&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls certtool template parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6395&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: null pointer dereference in _gnutls_figure_common_ciphersuite()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5981&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12243&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: gnutls impacted by inefficient der decoding in libtasn1 leading to remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12243&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28834&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28834&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14831&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: gnutls: denial of service via excessive resource consumption during certificate verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14831&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32989&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls sct extension parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28835&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28835&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9820&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: stack-based buffer overflow in gnutls_pkcs11_token_init() function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9820&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-0553&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: incomplete fix for cve-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0553&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libgcrypt-1.10.0-10.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2236&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2236&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41990&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 mishandles Dilithium signing. Writes to a static array lack a bounds check but do not use attacker-controlled data.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=openldap-2.6.2-3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openldap@2.6.2-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=openldap-2.6.2-3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/rpm-sign-libs@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/rpm-build-libs@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-rpm@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/rpm@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/tpm2-tss@3.0.3-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=tpm2-tss-3.0.3-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-22745&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-22745&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-22745&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-22745&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=gmp-6.2.0-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libsmartcols@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27456&#34;,&#xA;                &#34;title&#34; : &#34;util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27456&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3184&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: access control bypass due to improper hostname canonicalization&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3184&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgomp@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-pip-21.2.3-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/file-libs@5.39-12.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=file-5.39-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2022-48554&#34;,&#xA;                &#34;title&#34; : &#34;File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: \&#34;File\&#34; is the name of an Open Source project.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-48554&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2022-48554&#34;,&#xA;                &#34;title&#34; : &#34;File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: \&#34;File\&#34; is the name of an Open Source project.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-48554&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=2&amp;upstream=shadow-utils-4.9-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-4641&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4641&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56433&#34;,&#xA;                &#34;title&#34; : &#34;shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.6,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56433&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-4641&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4641&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-devel@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.6,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;              &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.1,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;              &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.6,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;              &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.6,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;              &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;              &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;              &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;              &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.3,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.1,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.1,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.1,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;              &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.1,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;              &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.1,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.8,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;              &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.8,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.8,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.2,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;              &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.0,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 4.8,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 4.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;              &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 4.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;              &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 4.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 4.0,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 3.7,&#xA;              &#34;severity&#34; : &#34;LOW&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 3.7,&#xA;              &#34;severity&#34; : &#34;LOW&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;              &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 2.7,&#xA;              &#34;severity&#34; : &#34;LOW&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-setuptools-53.0.0-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-47273&#34;,&#xA;                &#34;title&#34; : &#34;setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-47273&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5713&#34;,&#xA;                &#34;title&#34; : &#34;Out-of-bounds read/write during remote profiling and asyncio process introspection when connecting to malicious target&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5713&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13837&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13837&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4224&#34;,&#xA;                &#34;title&#34; : &#34;Stack overflow parsing XML with deeply nested DTD content models&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4224&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3644&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete control character validation in http.cookies&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3644&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12781&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12781&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3446&#34;,&#xA;                &#34;title&#34; : &#34;Base64 decoding stops at first padded quad by default&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15282&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15282&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1502&#34;,&#xA;                &#34;title&#34; : &#34;HTTP client proxy tunnel headers not validated for CR/LF&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1502&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2297&#34;,&#xA;                &#34;title&#34; : &#34;SourcelessFileLoader does not use io.open_code()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2297&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3479&#34;,&#xA;                &#34;title&#34; : &#34;pkgutil.get_data() does not enforce documented restrictions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3479&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13462&#34;,&#xA;                &#34;title&#34; : &#34;tarfile: Skip DIRTYPE normalization during GNU LONGNAME/LONGLINK handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=sqlite-3.34.1-6.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-7104&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3277&#34;,&#xA;                &#34;title&#34; : &#34;An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3277&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=expat-2.5.0-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28757&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45490&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8176&#34;,&#xA;                &#34;title&#34; : &#34;Libexpat: expat: improper restriction of xml entity expansion depth in libexpat&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45492&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45492&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50602&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59375&#34;,&#xA;                &#34;title&#34; : &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59375&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41080&#34;,&#xA;                &#34;title&#34; : &#34;libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41080&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-pip-21.2.3-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-systemd@234-18.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python-systemd-234-18.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-setuptools-53.0.0-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-47273&#34;,&#xA;                &#34;title&#34; : &#34;setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-47273&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5713&#34;,&#xA;                &#34;title&#34; : &#34;Out-of-bounds read/write during remote profiling and asyncio process introspection when connecting to malicious target&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5713&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13837&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13837&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4224&#34;,&#xA;                &#34;title&#34; : &#34;Stack overflow parsing XML with deeply nested DTD content models&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4224&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3644&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete control character validation in http.cookies&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3644&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12781&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12781&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3446&#34;,&#xA;                &#34;title&#34; : &#34;Base64 decoding stops at first padded quad by default&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15282&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15282&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1502&#34;,&#xA;                &#34;title&#34; : &#34;HTTP client proxy tunnel headers not validated for CR/LF&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1502&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2297&#34;,&#xA;                &#34;title&#34; : &#34;SourcelessFileLoader does not use io.open_code()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2297&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3479&#34;,&#xA;                &#34;title&#34; : &#34;pkgutil.get_data() does not enforce documented restrictions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3479&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13462&#34;,&#xA;                &#34;title&#34; : &#34;tarfile: Skip DIRTYPE normalization during GNU LONGNAME/LONGLINK handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=sqlite-3.34.1-6.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-7104&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3277&#34;,&#xA;                &#34;title&#34; : &#34;An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3277&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libgcrypt-1.10.0-10.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2236&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2236&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41990&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 mishandles Dilithium signing. Writes to a static array lack a bounds check but do not use attacker-controlled data.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=expat-2.5.0-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28757&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45490&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8176&#34;,&#xA;                &#34;title&#34; : &#34;Libexpat: expat: improper restriction of xml entity expansion depth in libexpat&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45492&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45492&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50602&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59375&#34;,&#xA;                &#34;title&#34; : &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59375&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41080&#34;,&#xA;                &#34;title&#34; : &#34;libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41080&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/systemd-libs@252-13.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=systemd-252-13.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4598&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4598&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-pip-21.2.3-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.5?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=httpd-2.4.53-11.el9_2.5.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;              &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-38475&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.1,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-38475&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-38476&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.1,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-38476&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-27522&#34;,&#xA;              &#34;title&#34; : &#34;Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-27522&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-31122&#34;,&#xA;              &#34;title&#34; : &#34;Apache HTTP Server: mod_macro buffer over-read&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-31122&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-38477&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-38477&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-47252&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-47252&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-23048&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-23048&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-49812&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-49812&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-39573&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.4,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-39573&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-58098&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.1,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-58098&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-38709&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.8,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-38709&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-65082&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-65082&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-66200&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.4,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-66200&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-38473&#34;,&#xA;              &#34;title&#34; : &#34;Apache HTTP Server proxy encoding problem&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-38473&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-24795&#34;,&#xA;              &#34;title&#34; : &#34;Apache HTTP Server: HTTP Response Splitting in multiple modules&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 4.0,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-24795&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.5?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=httpd-2.4.53-11.el9_2.5.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38475&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38475&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38476&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38476&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27522&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27522&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-31122&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_macro buffer over-read&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31122&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38477&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38477&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-47252&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-47252&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-23048&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-23048&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49812&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49812&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-39573&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-39573&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-58098&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-58098&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38709&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38709&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-65082&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-65082&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66200&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66200&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38473&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server proxy encoding problem&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38473&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-24795&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: HTTP Response Splitting in multiple modules&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-24795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.5?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=httpd-2.4.53-11.el9_2.5.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38475&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38475&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38476&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38476&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27522&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27522&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-31122&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_macro buffer over-read&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31122&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38477&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38477&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-47252&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-47252&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-23048&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-23048&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49812&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49812&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-39573&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-39573&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-58098&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-58098&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38709&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38709&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-65082&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-65082&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66200&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66200&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38473&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server proxy encoding problem&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38473&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-24795&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: HTTP Response Splitting in multiple modules&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-24795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/httpd-filesystem@2.4.53-11.el9_2.5?arch=noarch&amp;distro=rhel-9.2&amp;upstream=httpd-2.4.53-11.el9_2.5.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38475&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38475&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38476&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38476&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27522&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27522&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-31122&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_macro buffer over-read&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31122&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38477&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38477&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-47252&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-47252&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-23048&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-23048&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49812&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49812&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59775&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59775&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-39573&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-39573&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-58098&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-58098&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38709&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38709&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-65082&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-65082&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66200&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66200&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38473&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server proxy encoding problem&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38473&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-24795&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: HTTP Response Splitting in multiple modules&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-24795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=expat-2.5.0-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28757&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45490&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8176&#34;,&#xA;                &#34;title&#34; : &#34;Libexpat: expat: improper restriction of xml entity expansion depth in libexpat&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45492&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45492&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50602&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59375&#34;,&#xA;                &#34;title&#34; : &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59375&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41080&#34;,&#xA;                &#34;title&#34; : &#34;libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41080&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/apr@1.7.0-11.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=apr-1.7.0-11.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2022-24963&#34;,&#xA;                &#34;title&#34; : &#34;Apache Portable Runtime (APR): out-of-bound writes in the apr_encode family of functions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-24963&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2022-24963&#34;,&#xA;                &#34;title&#34; : &#34;Apache Portable Runtime (APR): out-of-bound writes in the apr_encode family of functions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-24963&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=2&amp;upstream=shadow-utils-4.9-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-4641&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4641&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56433&#34;,&#xA;                &#34;title&#34; : &#34;shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.6,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56433&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-4641&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4641&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;              &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=openssh-8.7p1-29.el9_2.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2023-38408&#34;,&#xA;              &#34;title&#34; : &#34;The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-38408&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-3497&#34;,&#xA;              &#34;title&#34; : &#34;Vulnerability in the OpenSSH GSSAPI delta included in various Linux distributions. This vulnerability affects the GSSAPI patches added by various Linux distributions and does not affect the OpenSSH upstream project itself. The usage of sshpkt_disconnect() on an error, which does not terminate the process, allows an attacker to send an unexpected GSSAPI message type during the GSSAPI key exchange to the server, which will call the underlying function and continue the execution of the program without setting the related connection variables. As the variables are not initialized to NULL the code later accesses those uninitialized variables, accessing random memory, which could lead to undefined behavior. The recommended workaround is to use ssh_packet_disconnect() instead, which does terminate the process. The impact of the vulnerability depends heavily on the compiler flag hardening configuration.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.2,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-3497&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-6387&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.1,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-6387&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-35385&#34;,&#xA;              &#34;title&#34; : &#34;In OpenSSH before 10.3, a file downloaded by scp may be installed setuid or setgid, an outcome contrary to some users&#39; expectations, if the download is performed as root with -O (legacy scp protocol) and without -p (preserve mode).&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-35385&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-6409&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.0,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-6409&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-26465&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.8,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-26465&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-51385&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-51385&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-48795&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-48795&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-61984&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-61984&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-61985&#34;,&#xA;              &#34;title&#34; : &#34;ssh in OpenSSH before 10.1 allows the &#39;\\0&#39; character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-61985&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-35414&#34;,&#xA;              &#34;title&#34; : &#34;OpenSSH before 10.3 mishandles the authorized_keys principals option in uncommon scenarios involving a principals list in conjunction with a Certificate Authority that makes certain use of comma characters.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 4.8,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-35414&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-32728&#34;,&#xA;              &#34;title&#34; : &#34;In sshd in OpenSSH before 10.0, the DisableForwarding directive does not adhere to the documentation stating that it disables X11 and agent forwarding.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 4.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-32728&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-35386&#34;,&#xA;              &#34;title&#34; : &#34;In OpenSSH before 10.3, command execution can occur via shell metacharacters in a username within a command line. This requires a scenario where the username on the command line is untrusted, and also requires a non-default configurations of % in ssh_config.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 3.6,&#xA;              &#34;severity&#34; : &#34;LOW&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-35386&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-35387&#34;,&#xA;              &#34;title&#34; : &#34;OpenSSH before 10.3 can use unintended ECDSA algorithms. Listing of any ECDSA algorithm in PubkeyAcceptedAlgorithms or HostbasedAcceptedAlgorithms is misinterpreted to mean all ECDSA algorithms.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 3.1,&#xA;              &#34;severity&#34; : &#34;LOW&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-35387&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-35388&#34;,&#xA;              &#34;title&#34; : &#34;OpenSSH before 10.3 omits connection multiplexing confirmation for proxy-mode multiplexing sessions.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 2.2,&#xA;              &#34;severity&#34; : &#34;LOW&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-35388&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28390&#34;,&#xA;                &#34;title&#34; : &#34;Possible NULL Dereference When Processing CMS KeyTransportRecipientInfo&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28390&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9231&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9231&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28388&#34;,&#xA;                &#34;title&#34; : &#34;NULL Pointer Dereference When Processing a Delta CRL&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28388&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28389&#34;,&#xA;                &#34;title&#34; : &#34;Possible NULL Dereference When Processing CMS KeyAgreeRecipientInfo&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28389&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-31790&#34;,&#xA;                &#34;title&#34; : &#34;Incorrect Failure Handling in RSA KEM RSASVE Encapsulation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-31790&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-31789&#34;,&#xA;                &#34;title&#34; : &#34;Heap Buffer Overflow in Hexadecimal Conversion&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-31789&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28386&#34;,&#xA;                &#34;title&#34; : &#34;Out-of-bounds Read in AES-CFB-128 on X86-64 with AVX-512 Support&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28386&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28387&#34;,&#xA;                &#34;title&#34; : &#34;Potential Use-after-free in DANE Client Code&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28387&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.1,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2673&#34;,&#xA;                &#34;title&#34; : &#34;OpenSSL TLS 1.3 server may choose unexpected key agreement group&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.1,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2673&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssh@8.7p1-29.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=openssh-8.7p1-29.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-38408&#34;,&#xA;                &#34;title&#34; : &#34;The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38408&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3497&#34;,&#xA;                &#34;title&#34; : &#34;Vulnerability in the OpenSSH GSSAPI delta included in various Linux distributions. This vulnerability affects the GSSAPI patches added by various Linux distributions and does not affect the OpenSSH upstream project itself. The usage of sshpkt_disconnect() on an error, which does not terminate the process, allows an attacker to send an unexpected GSSAPI message type during the GSSAPI key exchange to the server, which will call the underlying function and continue the execution of the program without setting the related connection variables. As the variables are not initialized to NULL the code later accesses those uninitialized variables, accessing random memory, which could lead to undefined behavior. The recommended workaround is to use ssh_packet_disconnect() instead, which does terminate the process. The impact of the vulnerability depends heavily on the compiler flag hardening configuration.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.2,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3497&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6387&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6387&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-35385&#34;,&#xA;                &#34;title&#34; : &#34;In OpenSSH before 10.3, a file downloaded by scp may be installed setuid or setgid, an outcome contrary to some users&#39; expectations, if the download is performed as root with -O (legacy scp protocol) and without -p (preserve mode).&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-35385&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-51767&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-51767&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6409&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6409&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-26465&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-26465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-51385&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-51385&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-48795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-48795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-61984&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-61984&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-61985&#34;,&#xA;                &#34;title&#34; : &#34;ssh in OpenSSH before 10.1 allows the &#39;\\0&#39; character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-61985&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-35414&#34;,&#xA;                &#34;title&#34; : &#34;OpenSSH before 10.3 mishandles the authorized_keys principals option in uncommon scenarios involving a principals list in conjunction with a Certificate Authority that makes certain use of comma characters.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-35414&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32728&#34;,&#xA;                &#34;title&#34; : &#34;In sshd in OpenSSH before 10.0, the DisableForwarding directive does not adhere to the documentation stating that it disables X11 and agent forwarding.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32728&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-35386&#34;,&#xA;                &#34;title&#34; : &#34;In OpenSSH before 10.3, command execution can occur via shell metacharacters in a username within a command line. This requires a scenario where the username on the command line is untrusted, and also requires a non-default configurations of % in ssh_config.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.6,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-35386&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-35387&#34;,&#xA;                &#34;title&#34; : &#34;OpenSSH before 10.3 can use unintended ECDSA algorithms. Listing of any ECDSA algorithm in PubkeyAcceptedAlgorithms or HostbasedAcceptedAlgorithms is misinterpreted to mean all ECDSA algorithms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.1,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-35387&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-35388&#34;,&#xA;                &#34;title&#34; : &#34;OpenSSH before 10.3 omits connection multiplexing confirmation for proxy-mode multiplexing sessions.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.2,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-35388&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-38408&#34;,&#xA;                &#34;title&#34; : &#34;The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38408&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=krb5-1.20.1-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39975&#34;,&#xA;                &#34;title&#34; : &#34;kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26462&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37370&#34;,&#xA;                &#34;title&#34; : &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37370&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-36054&#34;,&#xA;                &#34;title&#34; : &#34;lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-36054&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37371&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37371&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24528&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24528&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26458&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26461&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26461&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3576&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3576&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/pam@1.5.1-14.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=pam-1.5.1-14.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6020&#34;,&#xA;                &#34;title&#34; : &#34;Linux-pam: linux-pam directory traversal&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6020&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8941&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8941&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-10963&#34;,&#xA;                &#34;title&#34; : &#34;Pam: improper hostname interpretation in pam_access leads to access control bypass&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-10963&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-22365&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-22365&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-10041&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-10041&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6020&#34;,&#xA;                &#34;title&#34; : &#34;Linux-pam: linux-pam directory traversal&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6020&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libgcrypt-1.10.0-10.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2236&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2236&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41990&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 mishandles Dilithium signing. Writes to a static array lack a bounds check but do not use attacker-controlled data.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libeconf@0.4.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libeconf-0.4.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-22652&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in \&#34;read_file\&#34; function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-22652&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-22652&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in \&#34;read_file\&#34; function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-22652&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=gmp-6.2.0-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27456&#34;,&#xA;                &#34;title&#34; : &#34;util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27456&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3184&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: access control bypass due to improper hostname canonicalization&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3184&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libsmartcols@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/util-linux@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27456&#34;,&#xA;                &#34;title&#34; : &#34;util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27456&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3184&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: access control bypass due to improper hostname canonicalization&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3184&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libfdisk@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/util-linux-core@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/systemd-libs@252-13.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=systemd-252-13.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4598&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4598&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=2&amp;upstream=shadow-utils-4.9-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-4641&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4641&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56433&#34;,&#xA;                &#34;title&#34; : &#34;shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.6,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56433&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-4641&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4641&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2023-38408&#34;,&#xA;              &#34;title&#34; : &#34;The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-38408&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-chardet-4.0.0-5.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-setuptools-53.0.0-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-47273&#34;,&#xA;                &#34;title&#34; : &#34;setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-47273&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5713&#34;,&#xA;                &#34;title&#34; : &#34;Out-of-bounds read/write during remote profiling and asyncio process introspection when connecting to malicious target&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5713&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13837&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13837&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4224&#34;,&#xA;                &#34;title&#34; : &#34;Stack overflow parsing XML with deeply nested DTD content models&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4224&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3644&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete control character validation in http.cookies&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3644&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12781&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12781&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3446&#34;,&#xA;                &#34;title&#34; : &#34;Base64 decoding stops at first padded quad by default&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15282&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15282&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1502&#34;,&#xA;                &#34;title&#34; : &#34;HTTP client proxy tunnel headers not validated for CR/LF&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1502&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2297&#34;,&#xA;                &#34;title&#34; : &#34;SourcelessFileLoader does not use io.open_code()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2297&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3479&#34;,&#xA;                &#34;title&#34; : &#34;pkgutil.get_data() does not enforce documented restrictions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3479&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13462&#34;,&#xA;                &#34;title&#34; : &#34;tarfile: Skip DIRTYPE normalization during GNU LONGNAME/LONGLINK handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=sqlite-3.34.1-6.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-7104&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3277&#34;,&#xA;                &#34;title&#34; : &#34;An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3277&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=expat-2.5.0-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28757&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45490&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8176&#34;,&#xA;                &#34;title&#34; : &#34;Libexpat: expat: improper restriction of xml entity expansion depth in libexpat&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45492&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45492&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50602&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59375&#34;,&#xA;                &#34;title&#34; : &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59375&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41080&#34;,&#xA;                &#34;title&#34; : &#34;libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41080&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-pip-21.2.3-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libdnf-0.69.0-3.el9_2.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libxml2-2.9.13-3.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49794&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: heap use after free (uaf) leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49794&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49796&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: type confusion leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56171&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56171&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24928&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24928&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7425&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: libxml2: heap use-after-free in libxslt caused by atype corruption in xmlattrptr&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-25062&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-25062&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32415&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32415&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49795&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: null pointer dereference leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6021&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6021&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7424&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: type confusion in xmlnode.psvi between stylesheet and source nodes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7424&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39615&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39615&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6732&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via crafted xsd-validated document&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6732&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9714&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9714&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1757&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: memory leak leading to local denial of service in xmllint interactive shell&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-49043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-49043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28484&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28484&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-29469&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the &#39;\\0&#39; value).&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0990&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via uncontrolled recursion in xml catalog processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32414&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32414&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-26434&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2, there is a possible out of bounds read due to a buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-26434&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0989&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: unbounded relaxng include recursion leading to stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0992&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via crafted xml catalogs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.9,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0992&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6170&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: stack buffer overflow in xmllint interactive shell command handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6170&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=krb5-1.20.1-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39975&#34;,&#xA;                &#34;title&#34; : &#34;kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26462&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37370&#34;,&#xA;                &#34;title&#34; : &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37370&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-36054&#34;,&#xA;                &#34;title&#34; : &#34;lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-36054&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37371&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37371&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24528&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24528&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26458&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26461&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26461&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3576&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3576&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-setuptools-53.0.0-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-47273&#34;,&#xA;                &#34;title&#34; : &#34;setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-47273&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5713&#34;,&#xA;                &#34;title&#34; : &#34;Out-of-bounds read/write during remote profiling and asyncio process introspection when connecting to malicious target&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5713&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13837&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13837&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4224&#34;,&#xA;                &#34;title&#34; : &#34;Stack overflow parsing XML with deeply nested DTD content models&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4224&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3644&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete control character validation in http.cookies&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3644&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12781&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12781&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3446&#34;,&#xA;                &#34;title&#34; : &#34;Base64 decoding stops at first padded quad by default&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15282&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15282&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1502&#34;,&#xA;                &#34;title&#34; : &#34;HTTP client proxy tunnel headers not validated for CR/LF&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1502&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2297&#34;,&#xA;                &#34;title&#34; : &#34;SourcelessFileLoader does not use io.open_code()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2297&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3479&#34;,&#xA;                &#34;title&#34; : &#34;pkgutil.get_data() does not enforce documented restrictions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3479&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13462&#34;,&#xA;                &#34;title&#34; : &#34;tarfile: Skip DIRTYPE normalization during GNU LONGNAME/LONGLINK handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gnupg2-2.3.3-2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-24882&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-24882&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68973&#34;,&#xA;                &#34;title&#34; : &#34;In GnuPG before 2.4.9, armor_filter in g10/armor.c has two increments of an index variable where one is intended, leading to an out-of-bounds write for crafted input. (For ExtendedLTS, 2.2.51 and later are fixed versions.)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68973&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68972&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68972&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-24882&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-24882&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=curl-7.76.1-23.el9_2.1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2398&#34;,&#xA;                &#34;title&#34; : &#34;HTTP/2 push headers memory-leak&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2398&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27536&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists libcurl &lt;8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27536&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28321&#34;,&#xA;                &#34;title&#34; : &#34;An improper certificate validation vulnerability exists in curl &lt;v8.1.0 in the way it supports matching of wildcard patterns when listed as \&#34;Subject Alternative Name\&#34; in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28321&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27538&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27538&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-46218&#34;,&#xA;                &#34;title&#34; : &#34;This flaw allows a malicious HTTP server to set \&#34;super cookies\&#34; in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl&#39;s function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-46218&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9086&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9086&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27533&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability in input validation exists in curl &lt;8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \&#34;telnet options\&#34; during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application&#39;s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27534&#34;,&#xA;                &#34;title&#34; : &#34;A path traversal vulnerability exists in curl &lt;8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27534&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28322&#34;,&#xA;                &#34;title&#34; : &#34;An information disclosure vulnerability exists in curl &lt;v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28322&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38546&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38546&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=curl-7.76.1-23.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2398&#34;,&#xA;                &#34;title&#34; : &#34;HTTP/2 push headers memory-leak&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2398&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27535&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl &lt;8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27536&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists libcurl &lt;8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27536&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28321&#34;,&#xA;                &#34;title&#34; : &#34;An improper certificate validation vulnerability exists in curl &lt;v8.1.0 in the way it supports matching of wildcard patterns when listed as \&#34;Subject Alternative Name\&#34; in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28321&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27538&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27538&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-46218&#34;,&#xA;                &#34;title&#34; : &#34;This flaw allows a malicious HTTP server to set \&#34;super cookies\&#34; in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl&#39;s function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-46218&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9086&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9086&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27533&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability in input validation exists in curl &lt;8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \&#34;telnet options\&#34; during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application&#39;s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27534&#34;,&#xA;                &#34;title&#34; : &#34;A path traversal vulnerability exists in curl &lt;8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27534&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28322&#34;,&#xA;                &#34;title&#34; : &#34;An information disclosure vulnerability exists in curl &lt;v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28322&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38546&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38546&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libarchive-3.5.3-4.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-5914&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5914&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4111&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: infinite loop denial of service in rar5 decompression via archive_read_data() in libarchive&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4111&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4424&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: libarchive: information disclosure via heap out-of-bounds read in rar archive processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4424&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5121&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: libarchive: arbitrary code execution via integer overflow in iso9660 image processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5121&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-60753&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-60753&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-57970&#34;,&#xA;                &#34;title&#34; : &#34;libarchive through 3.7.7 has a heap-based buffer over-read in header_gnu_longlink in archive_read_support_format_tar.c via a TAR archive because it mishandles truncation in the middle of a GNU long linkname.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-57970&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-25724&#34;,&#xA;                &#34;title&#34; : &#34;list_item_verbose in tar/util.c in libarchive through 3.7.7 does not check an strftime return value, which can lead to a denial of service or unspecified other impact via a crafted TAR archive that is read with a verbose value of 2. For example, the 100-byte buffer may not be sufficient for a custom locale.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-25724&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-5914&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5914&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glib2-2.68.4-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13601&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in in g_escape_uri_string()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-52533&#34;,&#xA;                &#34;title&#34; : &#34;gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing &#39;\\0&#39; character.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-52533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32611&#34;,&#xA;                &#34;title&#34; : &#34;G_variant_byteswap() can take a long time with some non-normal inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32611&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32665&#34;,&#xA;                &#34;title&#34; : &#34;Gvariant deserialisation does not match spec for non-normal data&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32665&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14512&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in glib gio attribute escaping causes heap buffer overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14512&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-29499&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29499&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14087&#34;,&#xA;                &#34;title&#34; : &#34;Glib: glib: buffer underflow in gvariant parser leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14087&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4373&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4373&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-34397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.8,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-34397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7039&#34;,&#xA;                &#34;title&#34; : &#34;Glib: buffer under-read on glib through glib/gfileutils.c via get_tmp_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7039&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0988&#34;,&#xA;                &#34;title&#34; : &#34;Glib: glib: denial of service via integer overflow in g_buffered_input_stream_peek()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0988&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13601&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in in g_escape_uri_string()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=sqlite-3.34.1-6.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-7104&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3277&#34;,&#xA;                &#34;title&#34; : &#34;An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3277&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=expat-2.5.0-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28757&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45490&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8176&#34;,&#xA;                &#34;title&#34; : &#34;Libexpat: expat: improper restriction of xml entity expansion depth in libexpat&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45492&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45492&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50602&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59375&#34;,&#xA;                &#34;title&#34; : &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59375&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41080&#34;,&#xA;                &#34;title&#34; : &#34;libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41080&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=nghttp2-1.43.0-5.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27135&#34;,&#xA;                &#34;title&#34; : &#34;nghttp2 Denial of service: Assertion failure due to the missing state validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27135&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28182&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28182&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gnutls-3.7.6-20.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-0553&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: incomplete fix for cve-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0553&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0567&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0567&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32988&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls othername san export&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32988&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32990&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls certtool template parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6395&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: null pointer dereference in _gnutls_figure_common_ciphersuite()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5981&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12243&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: gnutls impacted by inefficient der decoding in libtasn1 leading to remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12243&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28834&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28834&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14831&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: gnutls: denial of service via excessive resource consumption during certificate verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14831&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32989&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls sct extension parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28835&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28835&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9820&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: stack-based buffer overflow in gnutls_pkcs11_token_init() function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9820&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-0553&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: incomplete fix for cve-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0553&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libgcrypt-1.10.0-10.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2236&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2236&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41990&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 mishandles Dilithium signing. Writes to a static array lack a bounds check but do not use attacker-controlled data.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=openldap-2.6.2-3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openldap@2.6.2-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=openldap-2.6.2-3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/rpm@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=gmp-6.2.0-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libsmartcols@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27456&#34;,&#xA;                &#34;title&#34; : &#34;util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27456&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3184&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: access control bypass due to improper hostname canonicalization&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3184&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-pip-21.2.3-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/file-libs@5.39-12.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=file-5.39-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2022-48554&#34;,&#xA;                &#34;title&#34; : &#34;File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: \&#34;File\&#34; is the name of an Open Source project.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-48554&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2022-48554&#34;,&#xA;                &#34;title&#34; : &#34;File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: \&#34;File\&#34; is the name of an Open Source project.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-48554&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=httpd-2.4.53-11.el9_2.5.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;              &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-38475&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.1,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-38475&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-38476&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.1,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-38476&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-27522&#34;,&#xA;              &#34;title&#34; : &#34;Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-27522&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-31122&#34;,&#xA;              &#34;title&#34; : &#34;Apache HTTP Server: mod_macro buffer over-read&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-31122&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-38477&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-38477&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-47252&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-47252&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-23048&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-23048&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-49812&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-49812&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-59775&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-59775&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-39573&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.4,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-39573&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-58098&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.1,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-58098&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-38709&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.8,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-38709&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-65082&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-65082&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-66200&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.4,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-66200&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-38473&#34;,&#xA;              &#34;title&#34; : &#34;Apache HTTP Server proxy encoding problem&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-38473&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-24795&#34;,&#xA;              &#34;title&#34; : &#34;Apache HTTP Server: HTTP Response Splitting in multiple modules&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 4.0,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-24795&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.5?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=httpd-2.4.53-11.el9_2.5.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38475&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38475&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38476&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38476&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27522&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27522&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-31122&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_macro buffer over-read&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31122&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38477&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38477&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-47252&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-47252&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-23048&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-23048&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49812&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49812&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-39573&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-39573&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-58098&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-58098&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38709&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38709&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-65082&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-65082&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66200&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66200&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38473&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server proxy encoding problem&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38473&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-24795&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: HTTP Response Splitting in multiple modules&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-24795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.5?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=httpd-2.4.53-11.el9_2.5.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38475&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38475&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38476&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38476&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27522&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27522&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-31122&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_macro buffer over-read&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31122&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38477&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38477&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-47252&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-47252&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-23048&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-23048&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49812&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49812&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-39573&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-39573&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-58098&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-58098&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38709&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38709&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-65082&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-65082&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66200&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66200&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38473&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server proxy encoding problem&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38473&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-24795&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: HTTP Response Splitting in multiple modules&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-24795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/httpd-filesystem@2.4.53-11.el9_2.5?arch=noarch&amp;distro=rhel-9.2&amp;upstream=httpd-2.4.53-11.el9_2.5.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38475&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38475&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38476&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38476&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27522&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27522&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-31122&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_macro buffer over-read&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31122&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38477&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38477&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-47252&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-47252&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-23048&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-23048&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49812&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49812&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59775&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59775&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-39573&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-39573&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-58098&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-58098&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38709&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38709&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-65082&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-65082&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66200&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66200&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38473&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server proxy encoding problem&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38473&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-24795&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: HTTP Response Splitting in multiple modules&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-24795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28390&#34;,&#xA;                &#34;title&#34; : &#34;Possible NULL Dereference When Processing CMS KeyTransportRecipientInfo&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28390&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9231&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9231&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28388&#34;,&#xA;                &#34;title&#34; : &#34;NULL Pointer Dereference When Processing a Delta CRL&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28388&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28389&#34;,&#xA;                &#34;title&#34; : &#34;Possible NULL Dereference When Processing CMS KeyAgreeRecipientInfo&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28389&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-31790&#34;,&#xA;                &#34;title&#34; : &#34;Incorrect Failure Handling in RSA KEM RSASVE Encapsulation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-31790&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-31789&#34;,&#xA;                &#34;title&#34; : &#34;Heap Buffer Overflow in Hexadecimal Conversion&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-31789&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28386&#34;,&#xA;                &#34;title&#34; : &#34;Out-of-bounds Read in AES-CFB-128 on X86-64 with AVX-512 Support&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28386&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28387&#34;,&#xA;                &#34;title&#34; : &#34;Potential Use-after-free in DANE Client Code&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28387&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.1,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2673&#34;,&#xA;                &#34;title&#34; : &#34;OpenSSL TLS 1.3 server may choose unexpected key agreement group&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.1,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2673&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/pam@1.5.1-14.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=pam-1.5.1-14.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6020&#34;,&#xA;                &#34;title&#34; : &#34;Linux-pam: linux-pam directory traversal&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6020&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8941&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8941&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-10963&#34;,&#xA;                &#34;title&#34; : &#34;Pam: improper hostname interpretation in pam_access leads to access control bypass&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-10963&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-22365&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-22365&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-10041&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-10041&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6020&#34;,&#xA;                &#34;title&#34; : &#34;Linux-pam: linux-pam directory traversal&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6020&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/systemd@252-13.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=systemd-252-13.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-29111&#34;,&#xA;                &#34;title&#34; : &#34;systemd: Local unprivileged user can trigger an assert&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-29111&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-40224&#34;,&#xA;                &#34;title&#34; : &#34;In systemd 259 before 260, there is local privilege escalation in systemd-machined because varlink can be used to reach the root namespace.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-40224&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4105&#34;,&#xA;                &#34;title&#34; : &#34;Systemd: systemd: privilege escalation via improper access control in registermachine d-bus method&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4105&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-40225&#34;,&#xA;                &#34;title&#34; : &#34;In udev in systemd before 260, local root execution can occur via malicious hardware devices and unsanitized kernel output.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-40225&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-40226&#34;,&#xA;                &#34;title&#34; : &#34;In nspawn in systemd 233 through 259 before 260, an escape-to-host action can occur via a crafted optional config file.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-40226&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-40227&#34;,&#xA;                &#34;title&#34; : &#34;In systemd 260 before 261, a local unprivileged user can trigger an assert via an IPC API call with an array or map that has a null element.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-40227&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4598&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4598&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-40223&#34;,&#xA;                &#34;title&#34; : &#34;In systemd 258 before 260, a local unprivileged user can trigger an assert when a Delegate=yes and User=&lt;unset&gt; unit exists and is running.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-40223&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-40228&#34;,&#xA;                &#34;title&#34; : &#34;In systemd 259, systemd-journald can send ANSI escape sequences to the terminals of arbitrary users when a \&#34;logger -p emerg\&#34; command is executed, if ForwardToWall=yes is set.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.9,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-40228&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-29111&#34;,&#xA;                &#34;title&#34; : &#34;systemd: Local unprivileged user can trigger an assert&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-29111&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libbrotli@1.0.9-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=brotli-1.0.9-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6176&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6176&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libgcrypt-1.10.0-10.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2236&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2236&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41990&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 mishandles Dilithium signing. Writes to a static array lack a bounds check but do not use attacker-controlled data.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=expat-2.5.0-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28757&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45490&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8176&#34;,&#xA;                &#34;title&#34; : &#34;Libexpat: expat: improper restriction of xml entity expansion depth in libexpat&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45492&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45492&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50602&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59375&#34;,&#xA;                &#34;title&#34; : &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59375&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41080&#34;,&#xA;                &#34;title&#34; : &#34;libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41080&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libeconf@0.4.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libeconf-0.4.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-22652&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in \&#34;read_file\&#34; function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-22652&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-22652&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in \&#34;read_file\&#34; function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-22652&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/apr@1.7.0-11.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=apr-1.7.0-11.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2022-24963&#34;,&#xA;                &#34;title&#34; : &#34;Apache Portable Runtime (APR): out-of-bound writes in the apr_encode family of functions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-24963&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2022-24963&#34;,&#xA;                &#34;title&#34; : &#34;Apache Portable Runtime (APR): out-of-bound writes in the apr_encode family of functions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-24963&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/dbus-common@1.12.20-7.el9_1?arch=noarch&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=dbus-1.12.20-7.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-34969&#34;,&#xA;                &#34;title&#34; : &#34;D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-34969&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-34969&#34;,&#xA;                &#34;title&#34; : &#34;D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-34969&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=dbus-1.12.20-7.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-34969&#34;,&#xA;                &#34;title&#34; : &#34;D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-34969&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-34969&#34;,&#xA;                &#34;title&#34; : &#34;D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-34969&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27456&#34;,&#xA;                &#34;title&#34; : &#34;util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27456&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3184&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: access control bypass due to improper hostname canonicalization&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3184&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libsmartcols@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/util-linux@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27456&#34;,&#xA;                &#34;title&#34; : &#34;util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27456&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3184&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: access control bypass due to improper hostname canonicalization&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3184&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libfdisk@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/util-linux-core@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/systemd-pam@252-13.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=systemd-252-13.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4598&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4598&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/systemd-rpm-macros@252-13.el9_2?arch=noarch&amp;distro=rhel-9.2&amp;upstream=systemd-252-13.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4598&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4598&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/systemd-libs@252-13.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=systemd-252-13.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4598&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4598&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=2&amp;upstream=shadow-utils-4.9-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-4641&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4641&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56433&#34;,&#xA;                &#34;title&#34; : &#34;shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.6,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56433&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-4641&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4641&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;              &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=scl-utils-2.0.3-4.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libxml2-2.9.13-3.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49794&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: heap use after free (uaf) leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49794&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49796&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: type confusion leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56171&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56171&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24928&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24928&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7425&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: libxml2: heap use-after-free in libxslt caused by atype corruption in xmlattrptr&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-25062&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-25062&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32415&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32415&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49795&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: null pointer dereference leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6021&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6021&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7424&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: type confusion in xmlnode.psvi between stylesheet and source nodes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7424&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39615&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39615&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6732&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via crafted xsd-validated document&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6732&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9714&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9714&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1757&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: memory leak leading to local denial of service in xmllint interactive shell&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-49043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-49043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28484&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28484&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-29469&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the &#39;\\0&#39; value).&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0990&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via uncontrolled recursion in xml catalog processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32414&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32414&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-26434&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2, there is a possible out of bounds read due to a buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-26434&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0989&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: unbounded relaxng include recursion leading to stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0992&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via crafted xml catalogs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.9,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0992&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6170&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: stack buffer overflow in xmllint interactive shell command handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6170&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=krb5-1.20.1-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39975&#34;,&#xA;                &#34;title&#34; : &#34;kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26462&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37370&#34;,&#xA;                &#34;title&#34; : &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37370&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-36054&#34;,&#xA;                &#34;title&#34; : &#34;lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-36054&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37371&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37371&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24528&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24528&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26458&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26461&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26461&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3576&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3576&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/less@590-1.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=less-590-1.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-32487&#34;,&#xA;                &#34;title&#34; : &#34;less through 653 allows OS command execution via a newline character in the name of a file, because quoting is mishandled in filename.c. Exploitation typically requires use with attacker-controlled file names, such as the files extracted from an untrusted archive. Exploitation also requires the LESSOPEN environment variable, but this is set by default in many common cases.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-32487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-46663&#34;,&#xA;                &#34;title&#34; : &#34;In GNU Less before 609, crafted data can result in \&#34;less -R\&#34; not filtering ANSI escape sequences sent to the terminal.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-46663&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-48624&#34;,&#xA;                &#34;title&#34; : &#34;close_altfile in filename.c in less before 606 omits shell_quote calls for LESSCLOSE.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-48624&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-32487&#34;,&#xA;                &#34;title&#34; : &#34;less through 653 allows OS command execution via a newline character in the name of a file, because quoting is mishandled in filename.c. Exploitation typically requires use with attacker-controlled file names, such as the files extracted from an untrusted archive. Exploitation also requires the LESSOPEN environment variable, but this is set by default in many common cases.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-32487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/vim-filesystem@8.2.2637-20.el9_1?arch=noarch&amp;distro=rhel-9.2&amp;epoch=2&amp;upstream=vim-8.2.2637-20.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-34982&#34;,&#xA;                &#34;title&#34; : &#34;Vim modeline bypass via various options affects Vim &lt; 9.2.0276&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.2,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-34982&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-25749&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-25749&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-33412&#34;,&#xA;                &#34;title&#34; : &#34;Vim affected by Command injection via newline in glob()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-33412&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4752&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4752&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-3903&#34;,&#xA;                &#34;title&#34; : &#34;Heap-based Buffer Overflow in vim/vim&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-3903&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28417&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28417&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-53905&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-53905&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-53906&#34;,&#xA;                &#34;title&#34; : &#34;Vim has path traversal issue with zip.vim and special crafted zip archives&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-53906&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-34982&#34;,&#xA;                &#34;title&#34; : &#34;Vim modeline bypass via various options affects Vim &lt; 9.2.0276&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.2,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-34982&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=curl-7.76.1-23.el9_2.1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2398&#34;,&#xA;                &#34;title&#34; : &#34;HTTP/2 push headers memory-leak&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2398&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27536&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists libcurl &lt;8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27536&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28321&#34;,&#xA;                &#34;title&#34; : &#34;An improper certificate validation vulnerability exists in curl &lt;v8.1.0 in the way it supports matching of wildcard patterns when listed as \&#34;Subject Alternative Name\&#34; in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28321&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27538&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27538&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-46218&#34;,&#xA;                &#34;title&#34; : &#34;This flaw allows a malicious HTTP server to set \&#34;super cookies\&#34; in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl&#39;s function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-46218&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9086&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9086&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27533&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability in input validation exists in curl &lt;8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \&#34;telnet options\&#34; during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application&#39;s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27534&#34;,&#xA;                &#34;title&#34; : &#34;A path traversal vulnerability exists in curl &lt;8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27534&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28322&#34;,&#xA;                &#34;title&#34; : &#34;An information disclosure vulnerability exists in curl &lt;v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28322&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38546&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38546&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=curl-7.76.1-23.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2398&#34;,&#xA;                &#34;title&#34; : &#34;HTTP/2 push headers memory-leak&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2398&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27535&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl &lt;8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27536&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists libcurl &lt;8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27536&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28321&#34;,&#xA;                &#34;title&#34; : &#34;An improper certificate validation vulnerability exists in curl &lt;v8.1.0 in the way it supports matching of wildcard patterns when listed as \&#34;Subject Alternative Name\&#34; in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28321&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27538&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27538&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-46218&#34;,&#xA;                &#34;title&#34; : &#34;This flaw allows a malicious HTTP server to set \&#34;super cookies\&#34; in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl&#39;s function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-46218&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9086&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9086&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27533&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability in input validation exists in curl &lt;8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \&#34;telnet options\&#34; during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application&#39;s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27534&#34;,&#xA;                &#34;title&#34; : &#34;A path traversal vulnerability exists in curl &lt;8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27534&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28322&#34;,&#xA;                &#34;title&#34; : &#34;An information disclosure vulnerability exists in curl &lt;v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28322&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38546&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38546&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libarchive-3.5.3-4.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-5914&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5914&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4111&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: infinite loop denial of service in rar5 decompression via archive_read_data() in libarchive&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4111&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4424&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: libarchive: information disclosure via heap out-of-bounds read in rar archive processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4424&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5121&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: libarchive: arbitrary code execution via integer overflow in iso9660 image processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5121&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-60753&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-60753&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-57970&#34;,&#xA;                &#34;title&#34; : &#34;libarchive through 3.7.7 has a heap-based buffer over-read in header_gnu_longlink in archive_read_support_format_tar.c via a TAR archive because it mishandles truncation in the middle of a GNU long linkname.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-57970&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-25724&#34;,&#xA;                &#34;title&#34; : &#34;list_item_verbose in tar/util.c in libarchive through 3.7.7 does not check an strftime return value, which can lead to a denial of service or unspecified other impact via a crafted TAR archive that is read with a verbose value of 2. For example, the 100-byte buffer may not be sufficient for a custom locale.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-25724&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-5914&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5914&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=sqlite-3.34.1-6.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-7104&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3277&#34;,&#xA;                &#34;title&#34; : &#34;An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3277&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libgcrypt-1.10.0-10.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2236&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2236&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41990&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 mishandles Dilithium signing. Writes to a static array lack a bounds check but do not use attacker-controlled data.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=nghttp2-1.43.0-5.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27135&#34;,&#xA;                &#34;title&#34; : &#34;nghttp2 Denial of service: Assertion failure due to the missing state validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27135&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28182&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28182&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/rpm@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=gmp-6.2.0-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/systemd-libs@252-13.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=systemd-252-13.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4598&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4598&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/procps-ng@3.3.17-11.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=procps-ng-3.3.17-11.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-4016&#34;,&#xA;                &#34;title&#34; : &#34;Under some circumstances, this weakness allows a user who has access to run the “ps” utility on a machine, the ability to write almost unlimited amounts of unfiltered data into the process heap.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4016&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-4016&#34;,&#xA;                &#34;title&#34; : &#34;Under some circumstances, this weakness allows a user who has access to run the “ps” utility on a machine, the ability to write almost unlimited amounts of unfiltered data into the process heap.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4016&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch&amp;distro=rhel-9.2&amp;upstream=dnf-4.14.0-5.el9_2.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libxml2-2.9.13-3.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49794&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: heap use after free (uaf) leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49794&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49796&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: type confusion leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56171&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56171&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24928&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24928&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7425&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: libxml2: heap use-after-free in libxslt caused by atype corruption in xmlattrptr&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-25062&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-25062&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32415&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32415&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49795&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: null pointer dereference leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6021&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6021&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7424&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: type confusion in xmlnode.psvi between stylesheet and source nodes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7424&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39615&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39615&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6732&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via crafted xsd-validated document&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6732&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9714&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9714&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1757&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: memory leak leading to local denial of service in xmllint interactive shell&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-49043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-49043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28484&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28484&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-29469&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the &#39;\\0&#39; value).&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0990&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via uncontrolled recursion in xml catalog processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32414&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32414&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-26434&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2, there is a possible out of bounds read due to a buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-26434&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0989&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: unbounded relaxng include recursion leading to stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0992&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via crafted xml catalogs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.9,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0992&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6170&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: stack buffer overflow in xmllint interactive shell command handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6170&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=krb5-1.20.1-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39975&#34;,&#xA;                &#34;title&#34; : &#34;kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26462&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37370&#34;,&#xA;                &#34;title&#34; : &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37370&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-36054&#34;,&#xA;                &#34;title&#34; : &#34;lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-36054&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37371&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37371&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24528&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24528&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26458&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26461&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26461&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3576&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3576&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-setuptools-53.0.0-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-47273&#34;,&#xA;                &#34;title&#34; : &#34;setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-47273&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5713&#34;,&#xA;                &#34;title&#34; : &#34;Out-of-bounds read/write during remote profiling and asyncio process introspection when connecting to malicious target&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5713&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13837&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13837&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4224&#34;,&#xA;                &#34;title&#34; : &#34;Stack overflow parsing XML with deeply nested DTD content models&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4224&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3644&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete control character validation in http.cookies&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3644&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12781&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12781&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3446&#34;,&#xA;                &#34;title&#34; : &#34;Base64 decoding stops at first padded quad by default&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15282&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15282&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1502&#34;,&#xA;                &#34;title&#34; : &#34;HTTP client proxy tunnel headers not validated for CR/LF&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1502&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2297&#34;,&#xA;                &#34;title&#34; : &#34;SourcelessFileLoader does not use io.open_code()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2297&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3479&#34;,&#xA;                &#34;title&#34; : &#34;pkgutil.get_data() does not enforce documented restrictions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3479&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13462&#34;,&#xA;                &#34;title&#34; : &#34;tarfile: Skip DIRTYPE normalization during GNU LONGNAME/LONGLINK handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcomps@0.1.18-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcomps-0.1.18-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-1312&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1312&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0980&#34;,&#xA;                &#34;title&#34; : &#34;Rubyipmi: red hat satellite: remote code execution in rubyipmi via malicious bmc username&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0980&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1207&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1207&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1530&#34;,&#xA;                &#34;title&#34; : &#34;Fog-kubevirt: fog-kubevirt: man-in-the-middle vulnerability due to disabled certificate validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1530&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1531&#34;,&#xA;                &#34;title&#34; : &#34;Foreman-kubevirt: foreman_kubevirt: man-in-the-middle due to insecure default ssl verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1531&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1961&#34;,&#xA;                &#34;title&#34; : &#34;Forman: foreman: remote code execution via command injection in websocket proxy&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-46877&#34;,&#xA;                &#34;title&#34; : &#34;jackson-databind 2.10.x through 2.12.x before 2.12.6 and 2.13.x before 2.13.1 allows attackers to cause a denial of service (2 GB transient heap usage per read) in uncommon situations involving JsonNode JDK serialization.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-46877&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14550&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14550&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6176&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1285&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1285&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68121&#34;,&#xA;                &#34;title&#34; : &#34;Unexpected session resumption in crypto/tls&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68121&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28863&#34;,&#xA;                &#34;title&#34; : &#34;node-tar vulnerable to denial of service while parsing a tar file due to lack of folders count validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28863&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4324&#34;,&#xA;                &#34;title&#34; : &#34;Rubygem-katello: katello: denial of service and potential information disclosure via sql injection&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4324&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-1312&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1312&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-libcomps@0.1.18-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcomps-0.1.18-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-1312&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1312&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0980&#34;,&#xA;                &#34;title&#34; : &#34;Rubyipmi: red hat satellite: remote code execution in rubyipmi via malicious bmc username&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0980&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1207&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1207&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1530&#34;,&#xA;                &#34;title&#34; : &#34;Fog-kubevirt: fog-kubevirt: man-in-the-middle vulnerability due to disabled certificate validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1530&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1531&#34;,&#xA;                &#34;title&#34; : &#34;Foreman-kubevirt: foreman_kubevirt: man-in-the-middle due to insecure default ssl verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1531&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1961&#34;,&#xA;                &#34;title&#34; : &#34;Forman: foreman: remote code execution via command injection in websocket proxy&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-46877&#34;,&#xA;                &#34;title&#34; : &#34;jackson-databind 2.10.x through 2.12.x before 2.12.6 and 2.13.x before 2.13.1 allows attackers to cause a denial of service (2 GB transient heap usage per read) in uncommon situations involving JsonNode JDK serialization.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-46877&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14550&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14550&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6176&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1285&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1285&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68121&#34;,&#xA;                &#34;title&#34; : &#34;Unexpected session resumption in crypto/tls&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68121&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28863&#34;,&#xA;                &#34;title&#34; : &#34;node-tar vulnerable to denial of service while parsing a tar file due to lack of folders count validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28863&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4324&#34;,&#xA;                &#34;title&#34; : &#34;Rubygem-katello: katello: denial of service and potential information disclosure via sql injection&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4324&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-1312&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1312&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gnupg2-2.3.3-2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-24882&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-24882&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68973&#34;,&#xA;                &#34;title&#34; : &#34;In GnuPG before 2.4.9, armor_filter in g10/armor.c has two increments of an index variable where one is intended, leading to an out-of-bounds write for crafted input. (For ExtendedLTS, 2.2.51 and later are fixed versions.)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68973&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68972&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68972&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-24882&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-24882&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=curl-7.76.1-23.el9_2.1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2398&#34;,&#xA;                &#34;title&#34; : &#34;HTTP/2 push headers memory-leak&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2398&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27536&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists libcurl &lt;8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27536&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28321&#34;,&#xA;                &#34;title&#34; : &#34;An improper certificate validation vulnerability exists in curl &lt;v8.1.0 in the way it supports matching of wildcard patterns when listed as \&#34;Subject Alternative Name\&#34; in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28321&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27538&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27538&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-46218&#34;,&#xA;                &#34;title&#34; : &#34;This flaw allows a malicious HTTP server to set \&#34;super cookies\&#34; in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl&#39;s function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-46218&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9086&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9086&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27533&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability in input validation exists in curl &lt;8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \&#34;telnet options\&#34; during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application&#39;s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27534&#34;,&#xA;                &#34;title&#34; : &#34;A path traversal vulnerability exists in curl &lt;8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27534&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28322&#34;,&#xA;                &#34;title&#34; : &#34;An information disclosure vulnerability exists in curl &lt;v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28322&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38546&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38546&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=curl-7.76.1-23.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2398&#34;,&#xA;                &#34;title&#34; : &#34;HTTP/2 push headers memory-leak&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2398&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27535&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl &lt;8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27536&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists libcurl &lt;8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27536&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28321&#34;,&#xA;                &#34;title&#34; : &#34;An improper certificate validation vulnerability exists in curl &lt;v8.1.0 in the way it supports matching of wildcard patterns when listed as \&#34;Subject Alternative Name\&#34; in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28321&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27538&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27538&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-46218&#34;,&#xA;                &#34;title&#34; : &#34;This flaw allows a malicious HTTP server to set \&#34;super cookies\&#34; in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl&#39;s function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-46218&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9086&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9086&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27533&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability in input validation exists in curl &lt;8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \&#34;telnet options\&#34; during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application&#39;s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27534&#34;,&#xA;                &#34;title&#34; : &#34;A path traversal vulnerability exists in curl &lt;8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27534&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28322&#34;,&#xA;                &#34;title&#34; : &#34;An information disclosure vulnerability exists in curl &lt;v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28322&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38546&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38546&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libarchive-3.5.3-4.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-5914&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5914&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4111&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: infinite loop denial of service in rar5 decompression via archive_read_data() in libarchive&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4111&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4424&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: libarchive: information disclosure via heap out-of-bounds read in rar archive processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4424&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5121&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: libarchive: arbitrary code execution via integer overflow in iso9660 image processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5121&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-60753&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-60753&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-57970&#34;,&#xA;                &#34;title&#34; : &#34;libarchive through 3.7.7 has a heap-based buffer over-read in header_gnu_longlink in archive_read_support_format_tar.c via a TAR archive because it mishandles truncation in the middle of a GNU long linkname.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-57970&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-25724&#34;,&#xA;                &#34;title&#34; : &#34;list_item_verbose in tar/util.c in libarchive through 3.7.7 does not check an strftime return value, which can lead to a denial of service or unspecified other impact via a crafted TAR archive that is read with a verbose value of 2. For example, the 100-byte buffer may not be sufficient for a custom locale.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-25724&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-5914&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5914&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glib2-2.68.4-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13601&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in in g_escape_uri_string()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-52533&#34;,&#xA;                &#34;title&#34; : &#34;gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing &#39;\\0&#39; character.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-52533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32611&#34;,&#xA;                &#34;title&#34; : &#34;G_variant_byteswap() can take a long time with some non-normal inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32611&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32665&#34;,&#xA;                &#34;title&#34; : &#34;Gvariant deserialisation does not match spec for non-normal data&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32665&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14512&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in glib gio attribute escaping causes heap buffer overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14512&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-29499&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29499&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14087&#34;,&#xA;                &#34;title&#34; : &#34;Glib: glib: buffer underflow in gvariant parser leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14087&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4373&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4373&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-34397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.8,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-34397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7039&#34;,&#xA;                &#34;title&#34; : &#34;Glib: buffer under-read on glib through glib/gfileutils.c via get_tmp_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7039&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0988&#34;,&#xA;                &#34;title&#34; : &#34;Glib: glib: denial of service via integer overflow in g_buffered_input_stream_peek()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0988&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13601&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in in g_escape_uri_string()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=sqlite-3.34.1-6.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-7104&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3277&#34;,&#xA;                &#34;title&#34; : &#34;An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3277&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=expat-2.5.0-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28757&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45490&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8176&#34;,&#xA;                &#34;title&#34; : &#34;Libexpat: expat: improper restriction of xml entity expansion depth in libexpat&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45492&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45492&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50602&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59375&#34;,&#xA;                &#34;title&#34; : &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59375&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41080&#34;,&#xA;                &#34;title&#34; : &#34;libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41080&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=nghttp2-1.43.0-5.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27135&#34;,&#xA;                &#34;title&#34; : &#34;nghttp2 Denial of service: Assertion failure due to the missing state validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27135&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28182&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28182&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gnutls-3.7.6-20.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-0553&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: incomplete fix for cve-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0553&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0567&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0567&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32988&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls othername san export&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32988&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32990&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls certtool template parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6395&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: null pointer dereference in _gnutls_figure_common_ciphersuite()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5981&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12243&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: gnutls impacted by inefficient der decoding in libtasn1 leading to remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12243&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28834&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28834&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14831&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: gnutls: denial of service via excessive resource consumption during certificate verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14831&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32989&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls sct extension parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28835&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28835&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9820&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: stack-based buffer overflow in gnutls_pkcs11_token_init() function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9820&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-0553&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: incomplete fix for cve-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0553&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libgcrypt-1.10.0-10.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2236&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2236&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41990&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 mishandles Dilithium signing. Writes to a static array lack a bounds check but do not use attacker-controlled data.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=openldap-2.6.2-3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openldap@2.6.2-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=openldap-2.6.2-3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/rpm-sign-libs@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/rpm-build-libs@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-rpm@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/rpm@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/tpm2-tss@3.0.3-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=tpm2-tss-3.0.3-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-22745&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-22745&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-22745&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-22745&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=gmp-6.2.0-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libsmartcols@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27456&#34;,&#xA;                &#34;title&#34; : &#34;util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27456&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3184&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: access control bypass due to improper hostname canonicalization&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3184&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgomp@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-pip-21.2.3-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/file-libs@5.39-12.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=file-5.39-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2022-48554&#34;,&#xA;                &#34;title&#34; : &#34;File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: \&#34;File\&#34; is the name of an Open Source project.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-48554&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2022-48554&#34;,&#xA;                &#34;title&#34; : &#34;File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: \&#34;File\&#34; is the name of an Open Source project.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-48554&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=2&amp;upstream=shadow-utils-4.9-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-4641&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4641&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56433&#34;,&#xA;                &#34;title&#34; : &#34;shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.6,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56433&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-4641&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4641&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2023-3899&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-3899&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libxml2-2.9.13-3.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49794&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: heap use after free (uaf) leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49794&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49796&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: type confusion leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56171&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56171&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24928&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24928&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7425&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: libxml2: heap use-after-free in libxslt caused by atype corruption in xmlattrptr&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-25062&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-25062&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32415&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32415&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49795&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: null pointer dereference leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6021&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6021&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7424&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: type confusion in xmlnode.psvi between stylesheet and source nodes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7424&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39615&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39615&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6732&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via crafted xsd-validated document&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6732&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9714&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9714&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1757&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: memory leak leading to local denial of service in xmllint interactive shell&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-49043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-49043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28484&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28484&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-29469&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the &#39;\\0&#39; value).&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0990&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via uncontrolled recursion in xml catalog processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32414&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32414&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-26434&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2, there is a possible out of bounds read due to a buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-26434&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0989&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: unbounded relaxng include recursion leading to stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0992&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via crafted xml catalogs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.9,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0992&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6170&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: stack buffer overflow in xmllint interactive shell command handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6170&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=krb5-1.20.1-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39975&#34;,&#xA;                &#34;title&#34; : &#34;kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26462&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37370&#34;,&#xA;                &#34;title&#34; : &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37370&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-36054&#34;,&#xA;                &#34;title&#34; : &#34;lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-36054&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37371&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37371&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24528&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24528&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26458&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26461&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26461&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3576&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3576&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-setuptools-53.0.0-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-47273&#34;,&#xA;                &#34;title&#34; : &#34;setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-47273&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5713&#34;,&#xA;                &#34;title&#34; : &#34;Out-of-bounds read/write during remote profiling and asyncio process introspection when connecting to malicious target&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5713&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13837&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13837&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4224&#34;,&#xA;                &#34;title&#34; : &#34;Stack overflow parsing XML with deeply nested DTD content models&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4224&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3644&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete control character validation in http.cookies&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3644&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12781&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12781&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3446&#34;,&#xA;                &#34;title&#34; : &#34;Base64 decoding stops at first padded quad by default&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15282&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15282&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1502&#34;,&#xA;                &#34;title&#34; : &#34;HTTP client proxy tunnel headers not validated for CR/LF&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1502&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2297&#34;,&#xA;                &#34;title&#34; : &#34;SourcelessFileLoader does not use io.open_code()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2297&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3479&#34;,&#xA;                &#34;title&#34; : &#34;pkgutil.get_data() does not enforce documented restrictions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3479&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13462&#34;,&#xA;                &#34;title&#34; : &#34;tarfile: Skip DIRTYPE normalization during GNU LONGNAME/LONGLINK handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gnupg2-2.3.3-2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-24882&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-24882&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68973&#34;,&#xA;                &#34;title&#34; : &#34;In GnuPG before 2.4.9, armor_filter in g10/armor.c has two increments of an index variable where one is intended, leading to an out-of-bounds write for crafted input. (For ExtendedLTS, 2.2.51 and later are fixed versions.)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68973&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68972&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68972&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-24882&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-24882&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=curl-7.76.1-23.el9_2.1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2398&#34;,&#xA;                &#34;title&#34; : &#34;HTTP/2 push headers memory-leak&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2398&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27536&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists libcurl &lt;8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27536&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28321&#34;,&#xA;                &#34;title&#34; : &#34;An improper certificate validation vulnerability exists in curl &lt;v8.1.0 in the way it supports matching of wildcard patterns when listed as \&#34;Subject Alternative Name\&#34; in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28321&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27538&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27538&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-46218&#34;,&#xA;                &#34;title&#34; : &#34;This flaw allows a malicious HTTP server to set \&#34;super cookies\&#34; in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl&#39;s function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-46218&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9086&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9086&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27533&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability in input validation exists in curl &lt;8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \&#34;telnet options\&#34; during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application&#39;s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27534&#34;,&#xA;                &#34;title&#34; : &#34;A path traversal vulnerability exists in curl &lt;8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27534&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28322&#34;,&#xA;                &#34;title&#34; : &#34;An information disclosure vulnerability exists in curl &lt;v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28322&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38546&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38546&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=curl-7.76.1-23.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2398&#34;,&#xA;                &#34;title&#34; : &#34;HTTP/2 push headers memory-leak&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2398&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27535&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl &lt;8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27536&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists libcurl &lt;8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27536&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28321&#34;,&#xA;                &#34;title&#34; : &#34;An improper certificate validation vulnerability exists in curl &lt;v8.1.0 in the way it supports matching of wildcard patterns when listed as \&#34;Subject Alternative Name\&#34; in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28321&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27538&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27538&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-46218&#34;,&#xA;                &#34;title&#34; : &#34;This flaw allows a malicious HTTP server to set \&#34;super cookies\&#34; in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl&#39;s function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-46218&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9086&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9086&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27533&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability in input validation exists in curl &lt;8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \&#34;telnet options\&#34; during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application&#39;s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27534&#34;,&#xA;                &#34;title&#34; : &#34;A path traversal vulnerability exists in curl &lt;8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27534&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28322&#34;,&#xA;                &#34;title&#34; : &#34;An information disclosure vulnerability exists in curl &lt;v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28322&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38546&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38546&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-cloud-what@1.29.33.1-1.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-3899&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3899&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-3899&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3899&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libarchive-3.5.3-4.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-5914&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5914&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4111&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: infinite loop denial of service in rar5 decompression via archive_read_data() in libarchive&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4111&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4424&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: libarchive: information disclosure via heap out-of-bounds read in rar archive processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4424&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5121&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: libarchive: arbitrary code execution via integer overflow in iso9660 image processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5121&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-60753&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-60753&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-57970&#34;,&#xA;                &#34;title&#34; : &#34;libarchive through 3.7.7 has a heap-based buffer over-read in header_gnu_longlink in archive_read_support_format_tar.c via a TAR archive because it mishandles truncation in the middle of a GNU long linkname.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-57970&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-25724&#34;,&#xA;                &#34;title&#34; : &#34;list_item_verbose in tar/util.c in libarchive through 3.7.7 does not check an strftime return value, which can lead to a denial of service or unspecified other impact via a crafted TAR archive that is read with a verbose value of 2. For example, the 100-byte buffer may not be sufficient for a custom locale.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-25724&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-5914&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5914&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=sqlite-3.34.1-6.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-7104&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3277&#34;,&#xA;                &#34;title&#34; : &#34;An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3277&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=nghttp2-1.43.0-5.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27135&#34;,&#xA;                &#34;title&#34; : &#34;nghttp2 Denial of service: Assertion failure due to the missing state validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27135&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28182&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28182&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=expat-2.5.0-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28757&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45490&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8176&#34;,&#xA;                &#34;title&#34; : &#34;Libexpat: expat: improper restriction of xml entity expansion depth in libexpat&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45492&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45492&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50602&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59375&#34;,&#xA;                &#34;title&#34; : &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59375&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41080&#34;,&#xA;                &#34;title&#34; : &#34;libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41080&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gnutls-3.7.6-20.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-0553&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: incomplete fix for cve-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0553&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0567&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0567&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32988&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls othername san export&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32988&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32990&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls certtool template parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6395&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: null pointer dereference in _gnutls_figure_common_ciphersuite()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5981&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12243&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: gnutls impacted by inefficient der decoding in libtasn1 leading to remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12243&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28834&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28834&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14831&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: gnutls: denial of service via excessive resource consumption during certificate verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14831&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32989&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls sct extension parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28835&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28835&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9820&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: stack-based buffer overflow in gnutls_pkcs11_token_init() function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9820&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-0553&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: incomplete fix for cve-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0553&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libgcrypt-1.10.0-10.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2236&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2236&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41990&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 mishandles Dilithium signing. Writes to a static array lack a bounds check but do not use attacker-controlled data.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=openldap-2.6.2-3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openldap@2.6.2-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=openldap-2.6.2-3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/dmidecode@3.3-7.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=dmidecode-3.3-7.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-30630&#34;,&#xA;                &#34;title&#34; : &#34;Dmidecode before 3.5 allows -dump-bin to overwrite a local file. This has security relevance because, for example, execution of Dmidecode via Sudo is plausible. NOTE: Some third parties have indicated the fix in 3.5 does not adequately address the vulnerability. The argument is that the proposed patch prevents dmidecode from writing to an existing file. However, there are multiple attack vectors that would not require overwriting an existing file that would provide the same level of unauthorized privilege escalation (e.g. creating a new file in /etc/cron.hourly).&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-30630&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-30630&#34;,&#xA;                &#34;title&#34; : &#34;Dmidecode before 3.5 allows -dump-bin to overwrite a local file. This has security relevance because, for example, execution of Dmidecode via Sudo is plausible. NOTE: Some third parties have indicated the fix in 3.5 does not adequately address the vulnerability. The argument is that the proposed patch prevents dmidecode from writing to an existing file. However, there are multiple attack vectors that would not require overwriting an existing file that would provide the same level of unauthorized privilege escalation (e.g. creating a new file in /etc/cron.hourly).&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-30630&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/rpm-sign-libs@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/rpm-build-libs@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-rpm@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/rpm@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/tpm2-tss@3.0.3-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=tpm2-tss-3.0.3-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-22745&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-22745&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-22745&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-22745&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=gmp-6.2.0-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-requests@2.25.1-6.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-requests-2.25.1-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-32681&#34;,&#xA;                &#34;title&#34; : &#34;Unintended leak of Proxy-Authorization header in requests&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32681&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-35195&#34;,&#xA;                &#34;title&#34; : &#34;Requests `Session` object does not verify requests after making first request with verify=False&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-35195&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-47081&#34;,&#xA;                &#34;title&#34; : &#34;Requests vulnerable to .netrc credentials leak via malicious URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-47081&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-32681&#34;,&#xA;                &#34;title&#34; : &#34;Unintended leak of Proxy-Authorization header in requests&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32681&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgomp@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-pip-21.2.3-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/file-libs@5.39-12.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=file-5.39-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2022-48554&#34;,&#xA;                &#34;title&#34; : &#34;File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: \&#34;File\&#34; is the name of an Open Source project.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-48554&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2022-48554&#34;,&#xA;                &#34;title&#34; : &#34;File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: \&#34;File\&#34; is the name of an Open Source project.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-48554&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=2&amp;upstream=shadow-utils-4.9-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-4641&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4641&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56433&#34;,&#xA;                &#34;title&#34; : &#34;shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.6,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56433&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-4641&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4641&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;              &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.1,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=krb5-1.20.1-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39975&#34;,&#xA;                &#34;title&#34; : &#34;kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26462&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37370&#34;,&#xA;                &#34;title&#34; : &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37370&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-36054&#34;,&#xA;                &#34;title&#34; : &#34;lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-36054&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37371&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37371&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24528&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24528&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26458&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26461&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26461&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3576&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3576&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-devel@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-headers@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/kernel-headers@5.14.0-284.11.1.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=kernel-5.14.0-284.11.1.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-44466&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in net/ceph/messenger_v2.c in the Linux kernel before 6.4.5. There is an integer signedness error, leading to a buffer overflow and remote code execution via HELLO or one of the AUTH frames. This occurs because of an untrusted length taken from a TCP packet in ceph_decode_32.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5154&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5154&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21927&#34;,&#xA;                &#34;title&#34; : &#34;nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21927&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1652&#34;,&#xA;                &#34;title&#34; : &#34;A use-after-free flaw was found in nfsd4_ssc_setup_dul in fs/nfsd/nfs4proc.c in the NFS filesystem in the Linux Kernel. This issue could allow a local attacker to crash the system or it may lead to a kernel information leak problem.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1652&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-52922&#34;,&#xA;                &#34;title&#34; : &#34;can: bcm: Fix UAF in bcm_proc_show()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52922&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-36971&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-36971&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21756&#34;,&#xA;                &#34;title&#34; : &#34;vsock: Keep the binding until socket destruction&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21756&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22020&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22020&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38052&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38052&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38087&#34;,&#xA;                &#34;title&#34; : &#34;net/sched: fix use-after-free in taprio_dev_notifier&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38087&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-41723&#34;,&#xA;                &#34;title&#34; : &#34;Denial of service via crafted HTTP/2 stream in net/http and golang.org/x/net&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-41723&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38471&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38471&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-42284&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-42284&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-53104&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-53104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-37750&#34;,&#xA;                &#34;title&#34; : &#34;smb: client: fix UAF in decryption with multichannel&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-37750&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38250&#34;,&#xA;                &#34;title&#34; : &#34;Bluetooth: hci_core: Fix use-after-free in vhci_flush()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38250&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-49846&#34;,&#xA;                &#34;title&#34; : &#34;udf: Fix a slab-out-of-bounds write bug in udf_find_entry()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-49846&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-52933&#34;,&#xA;                &#34;title&#34; : &#34;Squashfs: fix handling and sanity checking of xattr_ids count&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52933&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-53751&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-53751&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6606&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6606&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6610&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6610&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-35937&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38538&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38538&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-53150&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-53150&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-57947&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-57947&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21887&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21887&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21893&#34;,&#xA;                &#34;title&#34; : &#34;keys: Fix UAF in key_put()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21893&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21920&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21969&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21969&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21979&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21979&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21993&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21993&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21997&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21997&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22026&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22026&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22055&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22055&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22104&#34;,&#xA;                &#34;title&#34; : &#34;ibmvnic: Use kernel helpers for hex dumps&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22113&#34;,&#xA;                &#34;title&#34; : &#34;ext4: avoid journaling sb update on error if journal is destroying&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22113&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22121&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22121&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-37738&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-37738&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-37799&#34;,&#xA;                &#34;title&#34; : &#34;vmxnet3: Fix malformed packet sizing in vmxnet3_process_xdp&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-37799&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38264&#34;,&#xA;                &#34;title&#34; : &#34;nvme-tcp: sanitize request list handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38264&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-49977&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-49977&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-50066&#34;,&#xA;                &#34;title&#34; : &#34;net: atlantic: fix aq_vec index out of range error&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-50066&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-53047&#34;,&#xA;                &#34;title&#34; : &#34;tee: amdtee: fix race condition in amdtee_open_session&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-53047&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-53107&#34;,&#xA;                &#34;title&#34; : &#34;veth: Fix use after free in XDP_REDIRECT&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-53107&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6932&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in Linux kernel&#39;s ipv4: igmp component&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6932&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0646&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0646&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-46858&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-46858&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50154&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50154&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-53141&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-53141&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21764&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21764&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21867&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21867&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21919&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21919&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21926&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21926&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21966&#34;,&#xA;                &#34;title&#34; : &#34;dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21966&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22004&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22004&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22126&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22126&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-37797&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-37797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-37803&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-37803&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-37890&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-37890&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-37914&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-37914&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-37943&#34;,&#xA;                &#34;title&#34; : &#34;wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-37943&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38079&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38079&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38086&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38086&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38124&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38124&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38177&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38177&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38200&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38200&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38332&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38332&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-50616&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-50616&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56614&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56614&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56615&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56615&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21883&#34;,&#xA;                &#34;title&#34; : &#34;ice: Fix deinitializing VF in error path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21883&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21928&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21928&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21929&#34;,&#xA;                &#34;title&#34; : &#34;HID: intel-ish-hid: Fix use-after-free issue in hid_ishtp_cl_remove()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21929&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21991&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21991&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22085&#34;,&#xA;                &#34;title&#34; : &#34;RDMA/core: Fix use-after-free when rename device name&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22085&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-47383&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-47383&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21759&#34;,&#xA;                &#34;title&#34; : &#34;ipv6: mcast: extend RCU protection in igmp6_send()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21759&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28746&#34;,&#xA;                &#34;title&#34; : &#34;Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28746&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6356&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6356&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6536&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6536&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-21823&#34;,&#xA;                &#34;title&#34; : &#34;Hardware logic with insecure de-synchronization in Intel(R) DSA and Intel(R) IAA for some Intel(R) 4th or 5th generation Xeon(R) processors may allow an authorized user to potentially enable escalation of privilege local access&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-21823&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21999&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21999&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38350&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38350&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-46695&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-46695&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50275&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50275&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-42292&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-42292&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50302&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50302&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-49395&#34;,&#xA;                &#34;title&#34; : &#34;um: Fix out-of-bounds read in LDT setup&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-49395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5090&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5090&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26664&#34;,&#xA;                &#34;title&#34; : &#34;hwmon: (coretemp) Fix out-of-bounds memory access&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26664&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50264&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50264&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38110&#34;,&#xA;                &#34;title&#34; : &#34;net/mdiobus: Fix potential out-of-bounds clause 45 read/write access&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38110&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-53122&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-53122&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-53197&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-53197&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-36941&#34;,&#xA;                &#34;title&#34; : &#34;wifi: nl80211: don&#39;t free NULL coalescing rule&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-36941&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38627&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38627&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-50042&#34;,&#xA;                &#34;title&#34; : &#34;net: genl: fix error path memory leak in policy dumping&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-50042&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1074&#34;,&#xA;                &#34;title&#34; : &#34;A memory leak flaw was found in the Linux kernel&#39;s Stream Control Transmission Protocol. This issue may occur when a user starts a malicious networking service and someone connects to this service. This could allow a local user to starve resources, causing a denial of service.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1074&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-45862&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in drivers/usb/storage/ene_ub6250.c for the ENE UB6250 reader driver in the Linux kernel before 6.2.5. An object could potentially extend beyond the end of an allocation.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-45862&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-52490&#34;,&#xA;                &#34;title&#34; : &#34;mm: migrate: fix getting incorrect page mapping during page migration&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-52658&#34;,&#xA;                &#34;title&#34; : &#34;Revert \&#34;net/mlx5: Block entering switchdev mode with ns inconsistency\&#34;&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52658&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-53597&#34;,&#xA;                &#34;title&#34; : &#34;cifs: fix mid leak during reconnection after timeout threshold&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-53597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-53704&#34;,&#xA;                &#34;title&#34; : &#34;clk: imx: clk-imx8mp: improve error handling in imx8mp_clocks_probe()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-53704&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-54004&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-54004&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-54093&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-54093&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-54271&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-54271&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-7192&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7192&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0443&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0443&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26615&#34;,&#xA;                &#34;title&#34; : &#34;net/smc: fix illegal rmb_desc access in SMC-D connection dump&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26615&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26878&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-27046&#34;,&#xA;                &#34;title&#34; : &#34;nfp: flower: handle acti_netdevs allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-27046&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-27052&#34;,&#xA;                &#34;title&#34; : &#34;wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-27052&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-35789&#34;,&#xA;                &#34;title&#34; : &#34;wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-35789&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-35852&#34;,&#xA;                &#34;title&#34; : &#34;mlxsw: spectrum_acl_tcam: Fix memory leak when canceling rehash work&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-35852&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-35890&#34;,&#xA;                &#34;title&#34; : &#34;gro: fix ownership transfer&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-35890&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-35907&#34;,&#xA;                &#34;title&#34; : &#34;mlxbf_gige: call request_irq() after NAPI initialized&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-35907&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-35952&#34;,&#xA;                &#34;title&#34; : &#34;drm/ast: Fix soft lockup&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-35952&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-35989&#34;,&#xA;                &#34;title&#34; : &#34;dmaengine: idxd: Fix oops during rmmod on single-CPU platforms&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-35989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-39483&#34;,&#xA;                &#34;title&#34; : &#34;KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright masked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-39483&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-40959&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40959&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-41035&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-41035&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-41064&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-41064&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-42079&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-42079&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-42272&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-42272&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-42283&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-42283&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-42322&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-42322&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-43854&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-43854&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-44990&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-44990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-44994&#34;,&#xA;                &#34;title&#34; : &#34;iommu: Restore lost return in iommu_report_device_fault()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-44994&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45018&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45018&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-46713&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-46713&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-46824&#34;,&#xA;                &#34;title&#34; : &#34;iommufd: Require drivers to supply the cache_invalidate_user ops&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-46824&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-49949&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-49949&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50208&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50208&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50251&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50251&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50252&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50252&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-53113&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-53113&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21669&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21669&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21962&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21962&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21963&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21963&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21964&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21964&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-37785&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-37785&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38234&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38234&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-52448&#34;,&#xA;                &#34;title&#34; : &#34;gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52448&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-53755&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-53755&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-47745&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-47745&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-53088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-53088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21961&#34;,&#xA;                &#34;title&#34; : &#34;eth: bnxt: fix truesize for mb-xdp-pass case&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22036&#34;,&#xA;                &#34;title&#34; : &#34;exfat: fix random stack corruption after get_block&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22036&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38417&#34;,&#xA;                &#34;title&#34; : &#34;ice: fix eswitch code memory leak in reset scenario&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38417&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-52771&#34;,&#xA;                &#34;title&#34; : &#34;cxl/port: Fix delete_endpoint() vs parent unregistration race&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52771&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-52864&#34;,&#xA;                &#34;title&#34; : &#34;platform/x86: wmi: Fix opening of char device&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52864&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26855&#34;,&#xA;                &#34;title&#34; : &#34;net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26855&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-35845&#34;,&#xA;                &#34;title&#34; : &#34;wifi: iwlwifi: dbg-tlv: ensure NUL termination&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-35845&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-36922&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-36922&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38555&#34;,&#xA;                &#34;title&#34; : &#34;net/mlx5: Discard command completions in internal error&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38555&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38556&#34;,&#xA;                &#34;title&#34; : &#34;net/mlx5: Add a timeout to acquire the command queue semaphore&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38556&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-43855&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-43855&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-46826&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-46826&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26897&#34;,&#xA;                &#34;title&#34; : &#34;wifi: ath9k: delay all of ath9k_wmi_event_tasklet() until init is complete&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26897&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38586&#34;,&#xA;                &#34;title&#34; : &#34;r8169: Fix possible ring buffer corruption on fragmented Tx packets.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38586&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-50846&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-50846&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-53639&#34;,&#xA;                &#34;title&#34; : &#34;wifi: ath6kl: reduce WARN to dev_dbg() in callback&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-53639&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-54153&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-54153&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-54267&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-54267&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-44466&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in net/ceph/messenger_v2.c in the Linux kernel before 6.4.5. There is an integer signedness error, leading to a buffer overflow and remote code execution via HELLO or one of the AUTH frames. This occurs because of an untrusted length taken from a TCP packet in ceph_decode_32.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=curl-7.76.1-23.el9_2.1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2398&#34;,&#xA;                &#34;title&#34; : &#34;HTTP/2 push headers memory-leak&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2398&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27536&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists libcurl &lt;8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27536&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28321&#34;,&#xA;                &#34;title&#34; : &#34;An improper certificate validation vulnerability exists in curl &lt;v8.1.0 in the way it supports matching of wildcard patterns when listed as \&#34;Subject Alternative Name\&#34; in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28321&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27538&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27538&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-46218&#34;,&#xA;                &#34;title&#34; : &#34;This flaw allows a malicious HTTP server to set \&#34;super cookies\&#34; in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl&#39;s function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-46218&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9086&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9086&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27533&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability in input validation exists in curl &lt;8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \&#34;telnet options\&#34; during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application&#39;s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27534&#34;,&#xA;                &#34;title&#34; : &#34;A path traversal vulnerability exists in curl &lt;8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27534&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28322&#34;,&#xA;                &#34;title&#34; : &#34;An information disclosure vulnerability exists in curl &lt;v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28322&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38546&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38546&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=nghttp2-1.43.0-5.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27135&#34;,&#xA;                &#34;title&#34; : &#34;nghttp2 Denial of service: Assertion failure due to the missing state validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27135&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28182&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28182&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=gmp-6.2.0-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B-devel@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/cpp@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgomp@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=binutils-2.35.2-37.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2022-4285&#34;,&#xA;                &#34;title&#34; : &#34;An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a denial of service. This issue is the result of an incomplete fix for CVE-2020-16599.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-4285&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11082&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elf-eh-frame.c _bfd_elf_parse_eh_frame heap-based overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11082&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11083&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elfcode.h elf_swap_shdr heap-based overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11083&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5244&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils ld elflink.c elf_gc_sweep memory corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5244&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2022-4285&#34;,&#xA;                &#34;title&#34; : &#34;An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a denial of service. This issue is the result of an incomplete fix for CVE-2020-16599.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-4285&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/binutils@2.35.2-37.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=binutils-2.35.2-37.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2022-4285&#34;,&#xA;                &#34;title&#34; : &#34;An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a denial of service. This issue is the result of an incomplete fix for CVE-2020-16599.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-4285&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11081&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils objdump.c dump_dwarf_section out-of-bounds&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11081&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11082&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elf-eh-frame.c _bfd_elf_parse_eh_frame heap-based overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11082&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11083&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elfcode.h elf_swap_shdr heap-based overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11083&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11413&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elflink.c elf_link_add_object_symbols out-of-bounds&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11413&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5244&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils ld elflink.c elf_gc_sweep memory corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5244&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11412&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elflink.c bfd_elf_gc_record_vtentry out-of-bounds&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11412&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11414&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elflink.c get_link_hash_entry out-of-bounds&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11414&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11494&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elfxx-x86.c _bfd_x86_elf_late_size_sections out-of-bounds&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11494&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11495&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elf64-x86-64.c elf_x86_64_relocate_section heap-based overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11495&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11839&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils prdbg.c tg_tag_type return value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11839&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11840&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils ldmisc.c vfinfo out-of-bounds&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11840&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66861&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66862&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66862&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66863&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66863&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66864&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66864&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66866&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66866&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69647&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69647&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69648&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69648&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69649&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69649&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69650&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils thru 2.46 readelf contains a double free vulnerability when processing a crafted ELF binary with malformed relocation data. During GOT relocation handling, dump_relocations may return early without initializing the all_relocations array. As a result, process_got_section_contents() may pass an uninitialized r_symbol pointer to free(), leading to a double free and terminating the program with SIGABRT. No evidence of exploitable memory corruption or code execution was observed; the impact is limited to denial of service. NOTE: this is disputed by third parties because the observed behavior occurred only in pre-release code and did not affect any tagged version.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69652&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69652&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69645&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.8,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69645&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69646&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.8,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69646&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69651&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils thru 2.46 readelf contains a vulnerability that leads to an invalid pointer free when processing a crafted ELF binary with malformed relocation or symbol data. If dump_relocations returns early due to parsing errors, the internal all_relocations array may remain partially uninitialized. Later, process_got_section_contents() may attempt to free an invalid r_symbol pointer, triggering memory corruption checks in glibc and causing the program to terminate with SIGABRT. No evidence of further memory corruption or code execution was observed; the impact is limited to denial of service. NOTE: this is disputed by third parties because the observed behavior occurred only in pre-release code and did not affect any tagged version.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.8,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69651&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2022-4285&#34;,&#xA;                &#34;title&#34; : &#34;An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a denial of service. This issue is the result of an incomplete fix for CVE-2020-16599.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-4285&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gd-2.3.2-3.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libwebp-devel@1.2.0-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libwebp-1.2.0-6.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-4863&#34;,&#xA;                &#34;title&#34; : &#34;Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.6,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4863&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-4863&#34;,&#xA;                &#34;title&#34; : &#34;Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.6,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4863&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libwebp@1.2.0-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libwebp-1.2.0-6.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-4863&#34;,&#xA;                &#34;title&#34; : &#34;Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.6,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4863&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-4863&#34;,&#xA;                &#34;title&#34; : &#34;Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.6,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4863&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libxml2-2.9.13-3.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49794&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: heap use after free (uaf) leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49794&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49796&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: type confusion leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56171&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56171&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24928&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24928&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7425&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: libxml2: heap use-after-free in libxslt caused by atype corruption in xmlattrptr&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-25062&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-25062&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32415&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32415&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49795&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: null pointer dereference leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6021&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6021&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7424&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: type confusion in xmlnode.psvi between stylesheet and source nodes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7424&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39615&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39615&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6732&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via crafted xsd-validated document&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6732&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9714&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9714&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1757&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: memory leak leading to local denial of service in xmllint interactive shell&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-49043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-49043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28484&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28484&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-29469&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the &#39;\\0&#39; value).&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0990&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via uncontrolled recursion in xml catalog processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32414&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32414&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-26434&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2, there is a possible out of bounds read due to a buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-26434&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0989&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: unbounded relaxng include recursion leading to stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0992&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via crafted xml catalogs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.9,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0992&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6170&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: stack buffer overflow in xmllint interactive shell command handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6170&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libxml2-2.9.13-3.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49794&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: heap use after free (uaf) leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49794&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49796&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: type confusion leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56171&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56171&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24928&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24928&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7425&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: libxml2: heap use-after-free in libxslt caused by atype corruption in xmlattrptr&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-25062&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-25062&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32415&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32415&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49795&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: null pointer dereference leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6021&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6021&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7424&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: type confusion in xmlnode.psvi between stylesheet and source nodes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7424&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39615&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39615&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9714&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9714&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-49043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-49043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28484&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28484&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-29469&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the &#39;\\0&#39; value).&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32414&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32414&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-setuptools-53.0.0-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-47273&#34;,&#xA;                &#34;title&#34; : &#34;setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-47273&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtiff-devel@4.4.0-7.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtiff-4.4.0-7.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-9900&#34;,&#xA;                &#34;title&#34; : &#34;Libtiff: libtiff write-what-where&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8176&#34;,&#xA;                &#34;title&#34; : &#34;LibTIFF tiffmedian.c get_histogram use after free&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4775&#34;,&#xA;                &#34;title&#34; : &#34;Libtiff: libtiff: arbitrary code execution or denial of service via signed integer overflow in tiff file processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4775&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2017-17095&#34;,&#xA;                &#34;title&#34; : &#34;tools/pal2rgb.c in pal2rgb in LibTIFF 4.0.9 allows remote attackers to cause a denial of service (TIFFSetupStrips heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2017-17095&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-52355&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52355&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-52356&#34;,&#xA;                &#34;title&#34; : &#34;Libtiff: segment fault in libtiff  in tiffreadrgbatileext() leading to denial of service&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52356&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7006&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7006&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-40090&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in function TIFFReadDirectory libtiff before 4.4.0 allows attackers to cause a denial of service via crafted TIFF file.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-40090&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3618&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-40745&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40745&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-41175&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-41175&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0795&#34;,&#xA;                &#34;title&#34; : &#34;LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3488, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0796&#34;,&#xA;                &#34;title&#34; : &#34;LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3592, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0797&#34;,&#xA;                &#34;title&#34; : &#34;LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in libtiff/tif_unix.c:368, invoked by tools/tiffcrop.c:2903 and tools/tiffcrop.c:6921, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0798&#34;,&#xA;                &#34;title&#34; : &#34;LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3400, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0798&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0800&#34;,&#xA;                &#34;title&#34; : &#34;LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3502, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0800&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0801&#34;,&#xA;                &#34;title&#34; : &#34;LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in libtiff/tif_unix.c:368, invoked by tools/tiffcrop.c:2903 and tools/tiffcrop.c:6778, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0801&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0802&#34;,&#xA;                &#34;title&#34; : &#34;LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3724, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0803&#34;,&#xA;                &#34;title&#34; : &#34;LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3516, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0803&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0804&#34;,&#xA;                &#34;title&#34; : &#34;LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3609, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0804&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-48281&#34;,&#xA;                &#34;title&#34; : &#34;processCropSelections in tools/tiffcrop.c in LibTIFF through 4.5.0 has a heap-based buffer overflow (e.g., \&#34;WRITE of size 307203\&#34;) via a crafted TIFF image.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-48281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0799&#34;,&#xA;                &#34;title&#34; : &#34;LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3701, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0799&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-26965&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-26965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-26966&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-26966&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2731&#34;,&#xA;                &#34;title&#34; : &#34;A NULL pointer dereference flaw was found in Libtiff&#39;s LZWDecode() function in the libtiff/tif_lzw.c file. This flaw allows a local attacker to craft specific input data that can cause the program to dereference a NULL pointer when decompressing a TIFF format file, resulting in a program crash or denial of service.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2731&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3316&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3316&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3576&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3576&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6228&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6228&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-9900&#34;,&#xA;                &#34;title&#34; : &#34;Libtiff: libtiff write-what-where&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/graphite2@1.3.14-9.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=graphite2-1.3.14-9.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2017-5436&#34;,&#xA;                &#34;title&#34; : &#34;An out-of-bounds write in the Graphite 2 library triggered with a maliciously crafted Graphite font. This results in a potentially exploitable crash. This issue was fixed in the Graphite 2 library as well as Mozilla products. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2017-5436&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2017-5436&#34;,&#xA;                &#34;title&#34; : &#34;An out-of-bounds write in the Graphite 2 library triggered with a maliciously crafted Graphite font. This results in a potentially exploitable crash. This issue was fixed in the Graphite 2 library as well as Mozilla products. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2017-5436&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtiff@4.4.0-7.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtiff-4.4.0-7.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-9900&#34;,&#xA;                &#34;title&#34; : &#34;Libtiff: libtiff write-what-where&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8176&#34;,&#xA;                &#34;title&#34; : &#34;LibTIFF tiffmedian.c get_histogram use after free&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4775&#34;,&#xA;                &#34;title&#34; : &#34;Libtiff: libtiff: arbitrary code execution or denial of service via signed integer overflow in tiff file processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4775&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2017-17095&#34;,&#xA;                &#34;title&#34; : &#34;tools/pal2rgb.c in pal2rgb in LibTIFF 4.0.9 allows remote attackers to cause a denial of service (TIFFSetupStrips heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2017-17095&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-52355&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52355&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-52356&#34;,&#xA;                &#34;title&#34; : &#34;Libtiff: segment fault in libtiff  in tiffreadrgbatileext() leading to denial of service&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52356&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7006&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7006&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-40090&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in function TIFFReadDirectory libtiff before 4.4.0 allows attackers to cause a denial of service via crafted TIFF file.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-40090&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3618&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-40745&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40745&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-41175&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-41175&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0795&#34;,&#xA;                &#34;title&#34; : &#34;LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3488, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0796&#34;,&#xA;                &#34;title&#34; : &#34;LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3592, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0797&#34;,&#xA;                &#34;title&#34; : &#34;LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in libtiff/tif_unix.c:368, invoked by tools/tiffcrop.c:2903 and tools/tiffcrop.c:6921, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0798&#34;,&#xA;                &#34;title&#34; : &#34;LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3400, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0798&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0800&#34;,&#xA;                &#34;title&#34; : &#34;LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3502, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0800&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0801&#34;,&#xA;                &#34;title&#34; : &#34;LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in libtiff/tif_unix.c:368, invoked by tools/tiffcrop.c:2903 and tools/tiffcrop.c:6778, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0801&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0802&#34;,&#xA;                &#34;title&#34; : &#34;LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3724, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0803&#34;,&#xA;                &#34;title&#34; : &#34;LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3516, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0803&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0804&#34;,&#xA;                &#34;title&#34; : &#34;LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3609, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0804&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-48281&#34;,&#xA;                &#34;title&#34; : &#34;processCropSelections in tools/tiffcrop.c in LibTIFF through 4.5.0 has a heap-based buffer overflow (e.g., \&#34;WRITE of size 307203\&#34;) via a crafted TIFF image.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-48281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0799&#34;,&#xA;                &#34;title&#34; : &#34;LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3701, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0799&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-26965&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-26965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-26966&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-26966&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2731&#34;,&#xA;                &#34;title&#34; : &#34;A NULL pointer dereference flaw was found in Libtiff&#39;s LZWDecode() function in the libtiff/tif_lzw.c file. This flaw allows a local attacker to craft specific input data that can cause the program to dereference a NULL pointer when decompressing a TIFF format file, resulting in a program crash or denial of service.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2731&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3316&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3316&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3576&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3576&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-61143&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-61143&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-61144&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-61144&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-61145&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-61145&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6228&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6228&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-9900&#34;,&#xA;                &#34;title&#34; : &#34;Libtiff: libtiff write-what-where&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5713&#34;,&#xA;                &#34;title&#34; : &#34;Out-of-bounds read/write during remote profiling and asyncio process introspection when connecting to malicious target&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5713&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13837&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13837&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4224&#34;,&#xA;                &#34;title&#34; : &#34;Stack overflow parsing XML with deeply nested DTD content models&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4224&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3644&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete control character validation in http.cookies&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3644&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12781&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12781&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3446&#34;,&#xA;                &#34;title&#34; : &#34;Base64 decoding stops at first padded quad by default&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15282&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15282&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1502&#34;,&#xA;                &#34;title&#34; : &#34;HTTP client proxy tunnel headers not validated for CR/LF&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1502&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2297&#34;,&#xA;                &#34;title&#34; : &#34;SourcelessFileLoader does not use io.open_code()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2297&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3479&#34;,&#xA;                &#34;title&#34; : &#34;pkgutil.get_data() does not enforce documented restrictions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3479&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13462&#34;,&#xA;                &#34;title&#34; : &#34;tarfile: Skip DIRTYPE normalization during GNU LONGNAME/LONGLINK handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/freetype@2.10.4-9.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=freetype-2.10.4-9.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-27363&#34;,&#xA;                &#34;title&#34; : &#34;An out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are not vulnerable) when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-27363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-23865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-23865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-27363&#34;,&#xA;                &#34;title&#34; : &#34;An out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are not vulnerable) when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-27363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=freetype-2.10.4-9.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-27363&#34;,&#xA;                &#34;title&#34; : &#34;An out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are not vulnerable) when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-27363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-27363&#34;,&#xA;                &#34;title&#34; : &#34;An out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are not vulnerable) when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-27363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libX11-common@1.7.0-7.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=libX11-1.7.0-7.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-43787&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43787&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3138&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in libX11. The security flaw occurs because the functions in src/InitExt.c in libX11 do not check that the values provided for the Request, Event, or Error IDs are within the bounds of the arrays that those functions write to, using those IDs as array indexes. They trust that they were called with values provided by an Xserver adhering to the bounds specified in the X11 protocol, as all X servers provided by X.Org do. As the protocol only specifies a single byte for these values, an out-of-bounds value provided by a malicious server (or a malicious proxy-in-the-middle) can only overwrite other portions of the Display structure and not write outside the bounds of the Display structure itself, possibly causing the client to crash with this memory corruption.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-43785&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43785&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-43786&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-43787&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43787&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libX11-xcb@1.7.0-7.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libX11-1.7.0-7.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-43787&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43787&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3138&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in libX11. The security flaw occurs because the functions in src/InitExt.c in libX11 do not check that the values provided for the Request, Event, or Error IDs are within the bounds of the arrays that those functions write to, using those IDs as array indexes. They trust that they were called with values provided by an Xserver adhering to the bounds specified in the X11 protocol, as all X servers provided by X.Org do. As the protocol only specifies a single byte for these values, an out-of-bounds value provided by a malicious server (or a malicious proxy-in-the-middle) can only overwrite other portions of the Display structure and not write outside the bounds of the Display structure itself, possibly causing the client to crash with this memory corruption.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-43785&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43785&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-43786&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-43787&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43787&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libX11-devel@1.7.0-7.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libX11-1.7.0-7.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-43787&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43787&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3138&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in libX11. The security flaw occurs because the functions in src/InitExt.c in libX11 do not check that the values provided for the Request, Event, or Error IDs are within the bounds of the arrays that those functions write to, using those IDs as array indexes. They trust that they were called with values provided by an Xserver adhering to the bounds specified in the X11 protocol, as all X servers provided by X.Org do. As the protocol only specifies a single byte for these values, an out-of-bounds value provided by a malicious server (or a malicious proxy-in-the-middle) can only overwrite other portions of the Display structure and not write outside the bounds of the Display structure itself, possibly causing the client to crash with this memory corruption.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-43785&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43785&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-43786&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-43787&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43787&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libX11@1.7.0-7.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libX11-1.7.0-7.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-43787&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43787&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3138&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in libX11. The security flaw occurs because the functions in src/InitExt.c in libX11 do not check that the values provided for the Request, Event, or Error IDs are within the bounds of the arrays that those functions write to, using those IDs as array indexes. They trust that they were called with values provided by an Xserver adhering to the bounds specified in the X11 protocol, as all X servers provided by X.Org do. As the protocol only specifies a single byte for these values, an out-of-bounds value provided by a malicious server (or a malicious proxy-in-the-middle) can only overwrite other portions of the Display structure and not write outside the bounds of the Display structure itself, possibly causing the client to crash with this memory corruption.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-43785&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43785&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-43786&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-43787&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43787&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glib2-2.68.4-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13601&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in in g_escape_uri_string()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-52533&#34;,&#xA;                &#34;title&#34; : &#34;gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing &#39;\\0&#39; character.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-52533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32611&#34;,&#xA;                &#34;title&#34; : &#34;G_variant_byteswap() can take a long time with some non-normal inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32611&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32665&#34;,&#xA;                &#34;title&#34; : &#34;Gvariant deserialisation does not match spec for non-normal data&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32665&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14512&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in glib gio attribute escaping causes heap buffer overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14512&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-29499&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29499&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14087&#34;,&#xA;                &#34;title&#34; : &#34;Glib: glib: buffer underflow in gvariant parser leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14087&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4373&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4373&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-34397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.8,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-34397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7039&#34;,&#xA;                &#34;title&#34; : &#34;Glib: buffer under-read on glib through glib/gfileutils.c via get_tmp_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7039&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0988&#34;,&#xA;                &#34;title&#34; : &#34;Glib: glib: denial of service via integer overflow in g_buffered_input_stream_peek()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0988&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13601&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in in g_escape_uri_string()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glib2-devel@2.68.4-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glib2-2.68.4-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13601&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in in g_escape_uri_string()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-52533&#34;,&#xA;                &#34;title&#34; : &#34;gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing &#39;\\0&#39; character.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-52533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32611&#34;,&#xA;                &#34;title&#34; : &#34;G_variant_byteswap() can take a long time with some non-normal inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32611&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32665&#34;,&#xA;                &#34;title&#34; : &#34;Gvariant deserialisation does not match spec for non-normal data&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32665&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-29499&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29499&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4373&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4373&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-34397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.8,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-34397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13601&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in in g_escape_uri_string()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=sqlite-3.34.1-6.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-7104&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3277&#34;,&#xA;                &#34;title&#34; : &#34;An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3277&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libpng@1.6.37-12.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=2&amp;upstream=libpng-1.6.37-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-33636&#34;,&#xA;                &#34;title&#34; : &#34;LIBPNG has ARM NEON Palette Expansion Out-of-Bounds Read on AArch64&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-33636&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-33416&#34;,&#xA;                &#34;title&#34; : &#34;LIBPNG has use-after-free via pointer aliasing in `png_set_tRNS` and `png_set_PLTE`&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-33416&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-64720&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-64720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-65018&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-65018&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66293&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66293&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-25646&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-25646&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22801&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22801&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-28162&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-28162&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-64506&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-64506&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22695&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22695&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3713&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3713&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-28164&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-28164&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-64505&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-64505&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-33636&#34;,&#xA;                &#34;title&#34; : &#34;LIBPNG has ARM NEON Palette Expansion Out-of-Bounds Read on AArch64&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-33636&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/brotli-devel@1.0.9-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=brotli-1.0.9-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6176&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6176&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/brotli@1.0.9-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=brotli-1.0.9-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6176&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6176&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=expat-2.5.0-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28757&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45490&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8176&#34;,&#xA;                &#34;title&#34; : &#34;Libexpat: expat: improper restriction of xml entity expansion depth in libexpat&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45492&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45492&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50602&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59375&#34;,&#xA;                &#34;title&#34; : &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59375&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41080&#34;,&#xA;                &#34;title&#34; : &#34;libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41080&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/harfbuzz-devel@2.7.4-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=harfbuzz-2.7.4-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-25193&#34;,&#xA;                &#34;title&#34; : &#34;hb-ot-layout-gsubgpos.hh in HarfBuzz through 6.0.0 allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-25193&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-25193&#34;,&#xA;                &#34;title&#34; : &#34;hb-ot-layout-gsubgpos.hh in HarfBuzz through 6.0.0 allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-25193&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gnutls-3.7.6-20.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-0553&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: incomplete fix for cve-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0553&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0567&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0567&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32988&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls othername san export&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32988&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32990&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls certtool template parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6395&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: null pointer dereference in _gnutls_figure_common_ciphersuite()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5981&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12243&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: gnutls impacted by inefficient der decoding in libtasn1 leading to remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12243&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28834&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28834&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14831&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: gnutls: denial of service via excessive resource consumption during certificate verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14831&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32989&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls sct extension parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28835&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28835&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9820&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: stack-based buffer overflow in gnutls_pkcs11_token_init() function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9820&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-0553&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: incomplete fix for cve-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0553&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libbrotli@1.0.9-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=brotli-1.0.9-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6176&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6176&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-devel@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/harfbuzz-icu@2.7.4-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=harfbuzz-2.7.4-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-25193&#34;,&#xA;                &#34;title&#34; : &#34;hb-ot-layout-gsubgpos.hh in HarfBuzz through 6.0.0 allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-25193&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-25193&#34;,&#xA;                &#34;title&#34; : &#34;hb-ot-layout-gsubgpos.hh in HarfBuzz through 6.0.0 allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-25193&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/harfbuzz@2.7.4-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=harfbuzz-2.7.4-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-25193&#34;,&#xA;                &#34;title&#34; : &#34;hb-ot-layout-gsubgpos.hh in HarfBuzz through 6.0.0 allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-25193&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22693&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22693&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-25193&#34;,&#xA;                &#34;title&#34; : &#34;hb-ot-layout-gsubgpos.hh in HarfBuzz through 6.0.0 allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-25193&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libjpeg-turbo-devel@2.0.90-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libjpeg-turbo-2.0.90-6.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-29390&#34;,&#xA;                &#34;title&#34; : &#34;libjpeg-turbo version 2.0.90 has a heap-based buffer over-read (2 bytes) in decompress_smooth_data in jdcoefct.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-29390&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-29390&#34;,&#xA;                &#34;title&#34; : &#34;libjpeg-turbo version 2.0.90 has a heap-based buffer over-read (2 bytes) in decompress_smooth_data in jdcoefct.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-29390&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libpng-devel@1.6.37-12.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=2&amp;upstream=libpng-1.6.37-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-64720&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-64720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-65018&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-65018&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66293&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66293&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-25646&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-25646&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22801&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22801&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22695&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22695&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-64720&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-64720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libjpeg-turbo@2.0.90-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libjpeg-turbo-2.0.90-6.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-29390&#34;,&#xA;                &#34;title&#34; : &#34;libjpeg-turbo version 2.0.90 has a heap-based buffer over-read (2 bytes) in decompress_smooth_data in jdcoefct.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-29390&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-29390&#34;,&#xA;                &#34;title&#34; : &#34;libjpeg-turbo version 2.0.90 has a heap-based buffer over-read (2 bytes) in decompress_smooth_data in jdcoefct.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-29390&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libicu-devel@67.1-9.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=icu-67.1-9.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-5222&#34;,&#xA;                &#34;title&#34; : &#34;Icu: stack buffer overflow in the srbroot::addtag function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5222&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-5222&#34;,&#xA;                &#34;title&#34; : &#34;Icu: stack buffer overflow in the srbroot::addtag function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5222&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libicu@67.1-9.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=icu-67.1-9.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-5222&#34;,&#xA;                &#34;title&#34; : &#34;Icu: stack buffer overflow in the srbroot::addtag function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5222&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-5222&#34;,&#xA;                &#34;title&#34; : &#34;Icu: stack buffer overflow in the srbroot::addtag function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5222&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/pixman@0.40.0-5.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=pixman-0.40.0-5.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2022-44638&#34;,&#xA;                &#34;title&#34; : &#34;In libpixman in Pixman before 0.42.2, there is an out-of-bounds write (aka heap-based buffer overflow) in rasterize_edges_8 due to an integer overflow in pixman_sample_floor_y.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-44638&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2022-44638&#34;,&#xA;                &#34;title&#34; : &#34;In libpixman in Pixman before 0.42.2, there is an out-of-bounds write (aka heap-based buffer overflow) in rasterize_edges_8 due to an integer overflow in pixman_sample_floor_y.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-44638&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libmount-devel@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27456&#34;,&#xA;                &#34;title&#34; : &#34;util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27456&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3184&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: access control bypass due to improper hostname canonicalization&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3184&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libblkid-devel@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgomp@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libXpm@3.5.13-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libXpm-3.5.13-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-43788&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43788&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-43789&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43789&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-43788&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43788&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-pip-21.2.3-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libXpm-3.5.13-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-43788&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43788&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-43789&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43789&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-43788&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43788&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-devel@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=git-2.39.3-1.el9_2.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2024-32002&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.0,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-32002&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-48385&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.3,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-48385&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-32004&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.1,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-32004&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-48384&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.0,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-48384&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-52005&#34;,&#xA;              &#34;title&#34; : &#34;The sideband payload is passed unfiltered to the terminal in git&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-52005&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-32465&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.3,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-32465&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-27614&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-27614&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-52006&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 4.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-52006&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-27613&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 4.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-27613&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-32020&#34;,&#xA;              &#34;title&#34; : &#34;Cloning local Git repository by untrusted user allows the untrusted user to modify objects in the cloned repository at will&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 3.9,&#xA;              &#34;severity&#34; : &#34;LOW&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-32020&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-32021&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 3.9,&#xA;              &#34;severity&#34; : &#34;LOW&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-32021&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-50349&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 3.1,&#xA;              &#34;severity&#34; : &#34;LOW&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-50349&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-46835&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 3.1,&#xA;              &#34;severity&#34; : &#34;LOW&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-46835&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=openssh-8.7p1-29.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-38408&#34;,&#xA;                &#34;title&#34; : &#34;The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38408&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3497&#34;,&#xA;                &#34;title&#34; : &#34;Vulnerability in the OpenSSH GSSAPI delta included in various Linux distributions. This vulnerability affects the GSSAPI patches added by various Linux distributions and does not affect the OpenSSH upstream project itself. The usage of sshpkt_disconnect() on an error, which does not terminate the process, allows an attacker to send an unexpected GSSAPI message type during the GSSAPI key exchange to the server, which will call the underlying function and continue the execution of the program without setting the related connection variables. As the variables are not initialized to NULL the code later accesses those uninitialized variables, accessing random memory, which could lead to undefined behavior. The recommended workaround is to use ssh_packet_disconnect() instead, which does terminate the process. The impact of the vulnerability depends heavily on the compiler flag hardening configuration.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.2,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3497&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6387&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6387&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-35385&#34;,&#xA;                &#34;title&#34; : &#34;In OpenSSH before 10.3, a file downloaded by scp may be installed setuid or setgid, an outcome contrary to some users&#39; expectations, if the download is performed as root with -O (legacy scp protocol) and without -p (preserve mode).&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-35385&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6409&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6409&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-26465&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-26465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-51385&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-51385&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-48795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-48795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-61984&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-61984&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-61985&#34;,&#xA;                &#34;title&#34; : &#34;ssh in OpenSSH before 10.1 allows the &#39;\\0&#39; character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-61985&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-35414&#34;,&#xA;                &#34;title&#34; : &#34;OpenSSH before 10.3 mishandles the authorized_keys principals option in uncommon scenarios involving a principals list in conjunction with a Certificate Authority that makes certain use of comma characters.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-35414&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32728&#34;,&#xA;                &#34;title&#34; : &#34;In sshd in OpenSSH before 10.0, the DisableForwarding directive does not adhere to the documentation stating that it disables X11 and agent forwarding.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32728&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-35386&#34;,&#xA;                &#34;title&#34; : &#34;In OpenSSH before 10.3, command execution can occur via shell metacharacters in a username within a command line. This requires a scenario where the username on the command line is untrusted, and also requires a non-default configurations of % in ssh_config.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.6,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-35386&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-35387&#34;,&#xA;                &#34;title&#34; : &#34;OpenSSH before 10.3 can use unintended ECDSA algorithms. Listing of any ECDSA algorithm in PubkeyAcceptedAlgorithms or HostbasedAcceptedAlgorithms is misinterpreted to mean all ECDSA algorithms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.1,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-35387&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-35388&#34;,&#xA;                &#34;title&#34; : &#34;OpenSSH before 10.3 omits connection multiplexing confirmation for proxy-mode multiplexing sessions.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.2,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-35388&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-38408&#34;,&#xA;                &#34;title&#34; : &#34;The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38408&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28390&#34;,&#xA;                &#34;title&#34; : &#34;Possible NULL Dereference When Processing CMS KeyTransportRecipientInfo&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28390&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9231&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9231&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28388&#34;,&#xA;                &#34;title&#34; : &#34;NULL Pointer Dereference When Processing a Delta CRL&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28388&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28389&#34;,&#xA;                &#34;title&#34; : &#34;Possible NULL Dereference When Processing CMS KeyAgreeRecipientInfo&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28389&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-31790&#34;,&#xA;                &#34;title&#34; : &#34;Incorrect Failure Handling in RSA KEM RSASVE Encapsulation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-31790&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-31789&#34;,&#xA;                &#34;title&#34; : &#34;Heap Buffer Overflow in Hexadecimal Conversion&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-31789&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28386&#34;,&#xA;                &#34;title&#34; : &#34;Out-of-bounds Read in AES-CFB-128 on X86-64 with AVX-512 Support&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28386&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28387&#34;,&#xA;                &#34;title&#34; : &#34;Potential Use-after-free in DANE Client Code&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28387&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.1,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2673&#34;,&#xA;                &#34;title&#34; : &#34;OpenSSL TLS 1.3 server may choose unexpected key agreement group&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.1,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2673&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssh@8.7p1-29.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=openssh-8.7p1-29.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-38408&#34;,&#xA;                &#34;title&#34; : &#34;The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38408&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3497&#34;,&#xA;                &#34;title&#34; : &#34;Vulnerability in the OpenSSH GSSAPI delta included in various Linux distributions. This vulnerability affects the GSSAPI patches added by various Linux distributions and does not affect the OpenSSH upstream project itself. The usage of sshpkt_disconnect() on an error, which does not terminate the process, allows an attacker to send an unexpected GSSAPI message type during the GSSAPI key exchange to the server, which will call the underlying function and continue the execution of the program without setting the related connection variables. As the variables are not initialized to NULL the code later accesses those uninitialized variables, accessing random memory, which could lead to undefined behavior. The recommended workaround is to use ssh_packet_disconnect() instead, which does terminate the process. The impact of the vulnerability depends heavily on the compiler flag hardening configuration.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.2,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3497&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6387&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6387&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-35385&#34;,&#xA;                &#34;title&#34; : &#34;In OpenSSH before 10.3, a file downloaded by scp may be installed setuid or setgid, an outcome contrary to some users&#39; expectations, if the download is performed as root with -O (legacy scp protocol) and without -p (preserve mode).&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-35385&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-51767&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-51767&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6409&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6409&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-26465&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-26465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-51385&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-51385&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-48795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-48795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-61984&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-61984&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-61985&#34;,&#xA;                &#34;title&#34; : &#34;ssh in OpenSSH before 10.1 allows the &#39;\\0&#39; character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-61985&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-35414&#34;,&#xA;                &#34;title&#34; : &#34;OpenSSH before 10.3 mishandles the authorized_keys principals option in uncommon scenarios involving a principals list in conjunction with a Certificate Authority that makes certain use of comma characters.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-35414&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32728&#34;,&#xA;                &#34;title&#34; : &#34;In sshd in OpenSSH before 10.0, the DisableForwarding directive does not adhere to the documentation stating that it disables X11 and agent forwarding.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32728&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-35386&#34;,&#xA;                &#34;title&#34; : &#34;In OpenSSH before 10.3, command execution can occur via shell metacharacters in a username within a command line. This requires a scenario where the username on the command line is untrusted, and also requires a non-default configurations of % in ssh_config.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.6,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-35386&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-35387&#34;,&#xA;                &#34;title&#34; : &#34;OpenSSH before 10.3 can use unintended ECDSA algorithms. Listing of any ECDSA algorithm in PubkeyAcceptedAlgorithms or HostbasedAcceptedAlgorithms is misinterpreted to mean all ECDSA algorithms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.1,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-35387&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-35388&#34;,&#xA;                &#34;title&#34; : &#34;OpenSSH before 10.3 omits connection multiplexing confirmation for proxy-mode multiplexing sessions.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.2,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-35388&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-38408&#34;,&#xA;                &#34;title&#34; : &#34;The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38408&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=krb5-1.20.1-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39975&#34;,&#xA;                &#34;title&#34; : &#34;kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26462&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37370&#34;,&#xA;                &#34;title&#34; : &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37370&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-36054&#34;,&#xA;                &#34;title&#34; : &#34;lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-36054&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37371&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37371&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24528&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24528&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26458&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26461&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26461&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3576&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3576&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=git-2.39.3-1.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-32002&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-32002&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-48385&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-48385&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-32004&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-32004&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-48384&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-48384&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-52005&#34;,&#xA;                &#34;title&#34; : &#34;The sideband payload is passed unfiltered to the terminal in git&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-52005&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-32465&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-32465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-27614&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-27614&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-52006&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-52006&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-27613&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-27613&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-32020&#34;,&#xA;                &#34;title&#34; : &#34;Cloning local Git repository by untrusted user allows the untrusted user to modify objects in the cloned repository at will&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.9,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-32020&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-32021&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.9,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-32021&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50349&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.1,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50349&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-46835&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.1,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-46835&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-32002&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-32002&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/git-core@2.39.3-1.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=git-2.39.3-1.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-32002&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-32002&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-48385&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-48385&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-32004&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-32004&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-48384&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-48384&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-52005&#34;,&#xA;                &#34;title&#34; : &#34;The sideband payload is passed unfiltered to the terminal in git&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-52005&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-32465&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-32465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-27614&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-27614&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-52006&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-52006&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-27613&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-27613&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-32020&#34;,&#xA;                &#34;title&#34; : &#34;Cloning local Git repository by untrusted user allows the untrusted user to modify objects in the cloned repository at will&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.9,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-32020&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-32021&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.9,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-32021&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50349&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.1,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50349&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-46835&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.1,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-46835&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-32002&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-32002&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Git@2.39.3-1.el9_2?arch=noarch&amp;distro=rhel-9.2&amp;upstream=git-2.39.3-1.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-32002&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-32002&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-48385&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-48385&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-32004&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-32004&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-48384&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-48384&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-52005&#34;,&#xA;                &#34;title&#34; : &#34;The sideband payload is passed unfiltered to the terminal in git&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-52005&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-32465&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-32465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-27614&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-27614&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-52006&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-52006&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-27613&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-27613&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-32020&#34;,&#xA;                &#34;title&#34; : &#34;Cloning local Git repository by untrusted user allows the untrusted user to modify objects in the cloned repository at will&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.9,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-32020&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-32021&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.9,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-32021&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50349&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.1,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50349&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-46835&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.1,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-46835&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-32002&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-32002&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/git-core-doc@2.39.3-1.el9_2?arch=noarch&amp;distro=rhel-9.2&amp;upstream=git-2.39.3-1.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-32002&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-32002&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-48385&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-48385&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-32004&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-32004&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-48384&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-48384&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-52005&#34;,&#xA;                &#34;title&#34; : &#34;The sideband payload is passed unfiltered to the terminal in git&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-52005&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-32465&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-32465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-27614&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-27614&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-52006&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-52006&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-27613&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-27613&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-32020&#34;,&#xA;                &#34;title&#34; : &#34;Cloning local Git repository by untrusted user allows the untrusted user to modify objects in the cloned repository at will&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.9,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-32020&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-32021&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.9,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-32021&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50349&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.1,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50349&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-46835&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.1,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-46835&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-32002&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-32002&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/emacs-filesystem@27.2-8.el9_2.1?arch=noarch&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=emacs-27.2-8.el9_2.1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-1244&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-1244&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-30205&#34;,&#xA;                &#34;title&#34; : &#34;In Emacs before 29.3, Org mode considers contents of remote files to be trusted. This affects Org Mode before 9.6.23.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-30205&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-39331&#34;,&#xA;                &#34;title&#34; : &#34;In Emacs before 29.4, org-link-expand-abbrev in lisp/ol.el expands a %(...) link abbrev even when it specifies an unsafe function, such as shell-command-to-string. This affects Org Mode before 9.7.5.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-39331&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-53920&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-53920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-30203&#34;,&#xA;                &#34;title&#34; : &#34;In Emacs before 29.3, Gnus treats inline MIME contents as trusted.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-30203&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-30204&#34;,&#xA;                &#34;title&#34; : &#34;In Emacs before 29.3, LaTeX preview is enabled by default for e-mail attachments.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-30204&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-1244&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-1244&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/less@590-1.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=less-590-1.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-32487&#34;,&#xA;                &#34;title&#34; : &#34;less through 653 allows OS command execution via a newline character in the name of a file, because quoting is mishandled in filename.c. Exploitation typically requires use with attacker-controlled file names, such as the files extracted from an untrusted archive. Exploitation also requires the LESSOPEN environment variable, but this is set by default in many common cases.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-32487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-46663&#34;,&#xA;                &#34;title&#34; : &#34;In GNU Less before 609, crafted data can result in \&#34;less -R\&#34; not filtering ANSI escape sequences sent to the terminal.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-46663&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-48624&#34;,&#xA;                &#34;title&#34; : &#34;close_altfile in filename.c in less before 606 omits shell_quote calls for LESSCLOSE.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-48624&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-32487&#34;,&#xA;                &#34;title&#34; : &#34;less through 653 allows OS command execution via a newline character in the name of a file, because quoting is mishandled in filename.c. Exploitation typically requires use with attacker-controlled file names, such as the files extracted from an untrusted archive. Exploitation also requires the LESSOPEN environment variable, but this is set by default in many common cases.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-32487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=curl-7.76.1-23.el9_2.1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2398&#34;,&#xA;                &#34;title&#34; : &#34;HTTP/2 push headers memory-leak&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2398&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27536&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists libcurl &lt;8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27536&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28321&#34;,&#xA;                &#34;title&#34; : &#34;An improper certificate validation vulnerability exists in curl &lt;v8.1.0 in the way it supports matching of wildcard patterns when listed as \&#34;Subject Alternative Name\&#34; in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28321&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27538&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27538&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-46218&#34;,&#xA;                &#34;title&#34; : &#34;This flaw allows a malicious HTTP server to set \&#34;super cookies\&#34; in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl&#39;s function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-46218&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9086&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9086&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27533&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability in input validation exists in curl &lt;8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \&#34;telnet options\&#34; during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application&#39;s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27534&#34;,&#xA;                &#34;title&#34; : &#34;A path traversal vulnerability exists in curl &lt;8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27534&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28322&#34;,&#xA;                &#34;title&#34; : &#34;An information disclosure vulnerability exists in curl &lt;v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28322&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38546&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38546&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-31486&#34;,&#xA;                &#34;title&#34; : &#34;HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31486&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-31486&#34;,&#xA;                &#34;title&#34; : &#34;HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31486&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/pam@1.5.1-14.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=pam-1.5.1-14.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6020&#34;,&#xA;                &#34;title&#34; : &#34;Linux-pam: linux-pam directory traversal&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6020&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8941&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8941&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-10963&#34;,&#xA;                &#34;title&#34; : &#34;Pam: improper hostname interpretation in pam_access leads to access control bypass&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-10963&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-22365&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-22365&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-10041&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-10041&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6020&#34;,&#xA;                &#34;title&#34; : &#34;Linux-pam: linux-pam directory traversal&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6020&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=expat-2.5.0-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28757&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45490&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8176&#34;,&#xA;                &#34;title&#34; : &#34;Libexpat: expat: improper restriction of xml entity expansion depth in libexpat&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45492&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45492&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50602&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59375&#34;,&#xA;                &#34;title&#34; : &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59375&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41080&#34;,&#xA;                &#34;title&#34; : &#34;libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41080&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=nghttp2-1.43.0-5.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27135&#34;,&#xA;                &#34;title&#34; : &#34;nghttp2 Denial of service: Assertion failure due to the missing state validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27135&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28182&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28182&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libgcrypt-1.10.0-10.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2236&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2236&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41990&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 mishandles Dilithium signing. Writes to a static array lack a bounds check but do not use attacker-controlled data.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-mro@1.23-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Class-Struct@0.66-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-subs@1.03-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-interpreter@5.32.1-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=4&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-overload@1.31-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-libs@5.32.1-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=4&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-lib@0.65-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-File-stat@1.09-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-IO@1.43-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-File-Find@1.37-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-File-Basename@2.85-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-POSIX@1.94-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Symbol@1.08-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-SelectSaver@1.02-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Getopt-Std@1.12-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-vars@1.05-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-if@0.60.800-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Fcntl@1.13-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-DynaLoader@1.47-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-IPC-Open3@1.21-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-overloading@0.02-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Errno@1.30-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=perl-constant-1.33-461.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libeconf@0.4.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libeconf-0.4.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-22652&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in \&#34;read_file\&#34; function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-22652&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-22652&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in \&#34;read_file\&#34; function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-22652&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Storable@3.21-460.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=perl-Storable-3.21-460.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2017-20230&#34;,&#xA;                &#34;title&#34; : &#34;Storable versions before 3.05 for Perl has a stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2017-20230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2017-20230&#34;,&#xA;                &#34;title&#34; : &#34;Storable versions before 3.05 for Perl has a stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2017-20230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=gmp-6.2.0-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libsmartcols@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/util-linux@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27456&#34;,&#xA;                &#34;title&#34; : &#34;util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27456&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3184&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: access control bypass due to improper hostname canonicalization&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3184&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/util-linux-core@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27456&#34;,&#xA;                &#34;title&#34; : &#34;util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27456&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3184&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: access control bypass due to improper hostname canonicalization&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3184&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libfdisk@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/systemd-libs@252-13.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=systemd-252-13.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4598&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4598&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=2&amp;upstream=shadow-utils-4.9-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-4641&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4641&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56433&#34;,&#xA;                &#34;title&#34; : &#34;shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.6,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56433&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-4641&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4641&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2023-38408&#34;,&#xA;              &#34;title&#34; : &#34;The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-38408&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-pip@21.2.3-6.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-pip-21.2.3-6.el9.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;              &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-setuptools-53.0.0-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-47273&#34;,&#xA;                &#34;title&#34; : &#34;setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-47273&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5713&#34;,&#xA;                &#34;title&#34; : &#34;Out-of-bounds read/write during remote profiling and asyncio process introspection when connecting to malicious target&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5713&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13837&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13837&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4224&#34;,&#xA;                &#34;title&#34; : &#34;Stack overflow parsing XML with deeply nested DTD content models&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4224&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3644&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete control character validation in http.cookies&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3644&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12781&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12781&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3446&#34;,&#xA;                &#34;title&#34; : &#34;Base64 decoding stops at first padded quad by default&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15282&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15282&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1502&#34;,&#xA;                &#34;title&#34; : &#34;HTTP client proxy tunnel headers not validated for CR/LF&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1502&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2297&#34;,&#xA;                &#34;title&#34; : &#34;SourcelessFileLoader does not use io.open_code()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2297&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3479&#34;,&#xA;                &#34;title&#34; : &#34;pkgutil.get_data() does not enforce documented restrictions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3479&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13462&#34;,&#xA;                &#34;title&#34; : &#34;tarfile: Skip DIRTYPE normalization during GNU LONGNAME/LONGLINK handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=sqlite-3.34.1-6.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-7104&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3277&#34;,&#xA;                &#34;title&#34; : &#34;An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3277&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=expat-2.5.0-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28757&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45490&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8176&#34;,&#xA;                &#34;title&#34; : &#34;Libexpat: expat: improper restriction of xml entity expansion depth in libexpat&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45492&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45492&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50602&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59375&#34;,&#xA;                &#34;title&#34; : &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59375&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41080&#34;,&#xA;                &#34;title&#34; : &#34;libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41080&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-pip-21.2.3-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/nodejs-docs@16.19.1-1.el9_2?arch=noarch&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=nodejs-16.19.1-1.el9_2.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2023-39332&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-39332&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-32006&#34;,&#xA;              &#34;title&#34; : &#34;The use of `module.constructor.createRequire()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.\n\nThis vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x, and, 20.x.\n\nPlease note that at the time this CVE was issued, the policy is an experimental feature of Node.js.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-32006&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2022-4904&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.6,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2022-4904&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2022-35255&#34;,&#xA;              &#34;title&#34; : &#34;A weak randomness in WebCrypto keygen vulnerability exists in Node.js 18 due to a change with EntropySource() in SecretKeyGenTraits::DoKeyGen() in src/crypto/crypto_keygen.cc. There are two problems with this: 1) It does not check the return value, it assumes EntropySource() always succeeds, but it can (and sometimes will) fail. 2) The random data returned byEntropySource() may not be cryptographically strong and therefore not suitable as keying material.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.2,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2022-35255&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-32002&#34;,&#xA;              &#34;title&#34; : &#34;The use of `Module._load()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.\n\nThis vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x.\n\nPlease note that at the time this CVE was issued, the policy is an experimental feature of Node.js.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.1,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-32002&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-21892&#34;,&#xA;              &#34;title&#34; : &#34;On Linux, Node.js ignores certain environment variables if those may have been set by an unprivileged user while the process is running with elevated privileges with the only exception of CAP_NET_BIND_SERVICE.\nDue to a bug in the implementation of this exception, Node.js incorrectly applies this exception even when certain other capabilities have been set.\nThis allows unprivileged users to inject code that inherits the process&#39;s elevated privileges.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.1,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-21892&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-21896&#34;,&#xA;              &#34;title&#34; : &#34;The permission model protects itself against path traversal attacks by calling path.resolve() on any paths given by the user. If the path is to be treated as a Buffer, the implementation uses Buffer.from() to obtain a Buffer from the result of path.resolve(). By monkey-patching Buffer internals, namely, Buffer.prototype.utf8Write, the application can modify the result of path.resolve(), which leads to a path traversal vulnerability.\nThis vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21.\nPlease note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.9,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-21896&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-23083&#34;,&#xA;              &#34;title&#34; : &#34;With the aid of the diagnostics_channel utility, an event can be hooked into whenever a worker thread is created. This is not limited only to workers but also exposes internal workers, where an instance of them can be fetched, and its constructor can be grabbed and reinstated for malicious usage. \r\n\r\nThis vulnerability affects Permission Model users (--permission) on Node.js v20, v22, and v23.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.7,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-23083&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;              &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.7,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2021-35065&#34;,&#xA;              &#34;title&#34; : &#34;The glob-parent package before 6.0.1 for Node.js allows ReDoS (regular expression denial of service) attacks against the enclosure regular expression.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2021-35065&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2022-25881&#34;,&#xA;              &#34;title&#34; : &#34;This affects versions of the package http-cache-semantics before 4.1.1. The issue can be exploited via malicious request header values sent to a server, when that server reads the cache policy from the request using this library.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2022-25881&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2022-25883&#34;,&#xA;              &#34;title&#34; : &#34;Versions of the package semver before 7.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.\r\r\r&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2022-25883&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2022-3517&#34;,&#xA;              &#34;title&#34; : &#34;A vulnerability was found in the minimatch package. This flaw allows a Regular Expression Denial of Service (ReDoS) when calling the braceExpand function with specific arguments, resulting in a Denial of Service.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2022-3517&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2022-43548&#34;,&#xA;              &#34;title&#34; : &#34;A OS Command Injection vulnerability exists in Node.js versions &lt;14.21.1, &lt;16.18.1, &lt;18.12.1, &lt;19.0.1 due to an insufficient IsAllowedHost check that can easily be bypassed because IsIPAddress does not properly check if an IP address is invalid before making DBS requests allowing rebinding attacks.The fix for this issue in https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212 was incomplete and this new CVE is to complete the fix.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2022-43548&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-23918&#34;,&#xA;              &#34;title&#34; : &#34;A privilege escalation vulnerability exists in Node.js &lt;19.6.1, &lt;18.14.1, &lt;16.19.1 and &lt;14.21.3 that made it possible to bypass the experimental Permissions (https://nodejs.org/api/permissions.html) feature in Node.js and access non authorized modules by using process.mainModule.require(). This only affects users who had enabled the experimental permissions option with --experimental-policy.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-23918&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-23919&#34;,&#xA;              &#34;title&#34; : &#34;A cryptographic vulnerability exists in Node.js &lt;19.2.0, &lt;18.14.1, &lt;16.19.1, &lt;14.21.3 that in some cases did does not clear the OpenSSL error stack after operations that may set it. This may lead to false positive errors during subsequent cryptographic operations that happen to be on the same thread. This in turn could be used to cause a denial of service.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-23919&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-24807&#34;,&#xA;              &#34;title&#34; : &#34;Undici vulnerable to Regular Expression Denial of Service in Headers&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-24807&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-30581&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-30581&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-30590&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-30590&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-32067&#34;,&#xA;              &#34;title&#34; : &#34;0-byte UDP payload DoS in c-ares&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-32067&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-32559&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-32559&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-38552&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-38552&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-39331&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-39331&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-22019&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-22019&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-27983&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-27983&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-23166&#34;,&#xA;              &#34;title&#34; : &#34;The C++ method SignTraits::DeriveBits() may incorrectly call ThrowException() based on user-supplied inputs when executing in a background thread, crashing the Node.js process. Such cryptographic operations are commonly applied to untrusted inputs. Thus, this mechanism potentially allows an adversary to remotely crash a Node.js runtime.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-23166&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-59465&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-59465&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-1526&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-1526&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-1528&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-1528&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-21710&#34;,&#xA;              &#34;title&#34; : &#34;A flaw in Node.js HTTP request handling causes an uncaught `TypeError` when a request is received with a header named `__proto__` and the application accesses `req.headersDistinct`.\r\n\r\nWhen this occurs, `dest[\&#34;__proto__\&#34;]` resolves to `Object.prototype` rather than `undefined`, causing `.push()` to be called on a non-array. This exception is thrown synchronously inside a property getter and cannot be intercepted by `error` event listeners, meaning it cannot be handled without wrapping every `req.headersDistinct` access in a `try/catch`.\r\n\r\n* This vulnerability affects all Node.js HTTP servers on **20.x, 22.x, 24.x, and v25.x**&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-21710&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-2229&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-2229&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-27135&#34;,&#xA;              &#34;title&#34; : &#34;nghttp2 Denial of service: Assertion failure due to the missing state validation&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-27135&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-22017&#34;,&#xA;              &#34;title&#34; : &#34;setuid() does not affect libuv&#39;s internal io_uring operations if initialized before the call to setuid().\nThis allows the process to perform privileged operations despite presumably having dropped such privileges through a call to setuid().\nThis vulnerability affects all users using version greater or equal than Node.js 18.18.0, Node.js 20.4.0 and Node.js 21.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.3,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-22017&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-3277&#34;,&#xA;              &#34;title&#34; : &#34;An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.3,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-3277&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-1525&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.3,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-1525&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-55130&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.1,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-55130&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-55131&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.1,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-55131&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-30589&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.0,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-30589&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-31498&#34;,&#xA;              &#34;title&#34; : &#34;c-ares has a use-after-free in read_answers()&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.0,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-31498&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-22150&#34;,&#xA;              &#34;title&#34; : &#34;Undici Uses Insufficiently Random Values&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.8,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-22150&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-21891&#34;,&#xA;              &#34;title&#34; : &#34;Node.js depends on multiple built-in utility functions to normalize paths provided to node:fs functions, which can be overwitten with user-defined implementations leading to filesystem permission model bypass through path traversal attack.\nThis vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21.\nPlease note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.6,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-21891&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2022-35256&#34;,&#xA;              &#34;title&#34; : &#34;The llhttp parser in the http module in Node v18.7.0 does not correctly handle header fields that are not terminated with CLRF. This may result in HTTP Request Smuggling.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2022-35256&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-23936&#34;,&#xA;              &#34;title&#34; : &#34;CRLF Injection in Nodejs ‘undici’ via host&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-23936&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-22020&#34;,&#xA;              &#34;title&#34; : &#34;A security flaw in Node.js  allows a bypass of network import restrictions.\nBy embedding non-network imports in data URLs, an attacker can execute arbitrary code, compromising system security.\nVerified on various platforms, the vulnerability is mitigated by forbidding data URLs in network imports.\nExploiting this flaw can violate network import security, posing a risk to developers and servers.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-22020&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-22025&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-22025&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-28863&#34;,&#xA;              &#34;title&#34; : &#34;node-tar vulnerable to denial of service while parsing a tar file due to lack of folders count validation&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-28863&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-23167&#34;,&#xA;              &#34;title&#34; : &#34;A flaw in Node.js 20&#39;s HTTP parser allows improper termination of HTTP/1 headers using `\\r\\n\\rX` instead of the required `\\r\\n\\r\\n`.\nThis inconsistency enables request smuggling, allowing attackers to bypass proxy-based access controls and submit unauthorized requests.\n\nThe issue was resolved by upgrading `llhttp` to version 9, which enforces correct header termination.\n\nImpact:\n* This vulnerability affects only Node.js 20.x users prior to the `llhttp` v9 upgrade.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-23167&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-1527&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-1527&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-21712&#34;,&#xA;              &#34;title&#34; : &#34;A flaw in Node.js URL processing causes an assertion failure in native code when `url.format()` is called with a malformed internationalized domain name (IDN) containing invalid characters, crashing the Node.js process.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-21712&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-25547&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-25547&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-26996&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-26996&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-27904&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-27904&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-27982&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.1,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-27982&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-31147&#34;,&#xA;              &#34;title&#34; : &#34;Insufficient randomness in generation of DNS query IDs in c-ares&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-31147&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-46809&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-46809&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-59466&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-59466&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-21637&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-21637&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-21713&#34;,&#xA;              &#34;title&#34; : &#34;A flaw in Node.js HMAC verification uses a non-constant-time comparison when validating user-provided signatures, potentially leaking timing information proportional to the number of matching bytes. Under certain threat models where high-resolution timing measurements are possible, this behavior could be exploited as a timing oracle to infer HMAC values.\r\n\r\nNode.js already provides timing-safe comparison primitives used elsewhere in the codebase, indicating this is an oversight rather than an intentional design decision.\r\n\r\nThis vulnerability affects **20.x, 22.x, 24.x, and 25.x**.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-21713&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-21717&#34;,&#xA;              &#34;title&#34; : &#34;A flaw in V8&#39;s string hashing mechanism causes integer-like strings to be hashed to their numeric value, making hash collisions trivially predictable. By crafting a request that causes many such collisions in V8&#39;s internal string table, an attacker can significantly degrade performance of the Node.js process.\r\n\r\nThe most common trigger is any endpoint that calls `JSON.parse()` on attacker-controlled input, as JSON parsing automatically internalizes short strings into the affected hash table.\r\n\r\nThis vulnerability affects **20.x, 22.x, 24.x, and 25.x**.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-21717&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-2581&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-2581&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-31130&#34;,&#xA;              &#34;title&#34; : &#34;Buffer Underwrite in ares_inet_net_pton()&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.7,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-31130&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-30588&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-30588&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-39333&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-39333&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-28182&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-28182&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-23085&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-23085&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-55132&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-55132&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-21714&#34;,&#xA;              &#34;title&#34; : &#34;A memory leak occurs in Node.js HTTP/2 servers when a client sends WINDOW_UPDATE frames on stream 0 (connection-level) that cause the flow control window to exceed the maximum value of 2³¹-1. The server correctly sends a GOAWAY frame, but the Http2Session object is never cleaned up.\r\n\r\nThis vulnerability affects HTTP2 users on Node.js 20, 22, 24 and 25.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-21714&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-21711&#34;,&#xA;              &#34;title&#34; : &#34;A flaw in Node.js Permission Model network enforcement leaves Unix Domain Socket (UDS) server operations without the required permission checks, while all comparable network paths correctly enforce them.\r\n\r\nAs a result, code running under `--permission` without `--allow-net` can create and expose local IPC endpoints, allowing communication with other processes on the same host outside of the intended network restriction boundary.\r\n\r\nThis vulnerability affects Node.js **25.x** processes using the Permission Model where `--allow-net` is intentionally omitted to restrict network access. Note that `--allow-net` is currently an experimental feature.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.2,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-21711&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-21890&#34;,&#xA;              &#34;title&#34; : &#34;The Node.js Permission Model does not clarify in the documentation that wildcards should be only used as the last character of a file path. For example:\n```\n --allow-fs-read=/home/node/.ssh/*.pub\n```\n\nwill ignore `pub` and give access to everything after `.ssh/`.\n\nThis misleading documentation affects all users using the experimental permission model in Node.js 20 and Node.js 21.\n\nPlease note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.0,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-21890&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-25629&#34;,&#xA;              &#34;title&#34; : &#34;c-ares out of bounds read in ares__read_line()&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 4.4,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-25629&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-23920&#34;,&#xA;              &#34;title&#34; : &#34;An untrusted search path vulnerability exists in Node.js. &lt;19.6.1, &lt;18.14.1, &lt;16.19.1, and &lt;14.21.3 that could allow an attacker to search and potentially load ICU data when running with elevated privileges.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 4.2,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-23920&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-45143&#34;,&#xA;              &#34;title&#34; : &#34;Undici&#39;s cookie header not cleared on cross-origin redirect in fetch&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 3.9,&#xA;              &#34;severity&#34; : &#34;LOW&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-45143&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-36137&#34;,&#xA;              &#34;title&#34; : &#34;A vulnerability has been identified in Node.js, affecting users of the experimental permission model when the --allow-fs-write flag is used.\r\n\r\nNode.js Permission Model do not operate on file descriptors, however, operations such as fs.fchown or fs.fchmod can use a \&#34;read-only\&#34; file descriptor to change the owner and permissions of a file.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 3.9,&#xA;              &#34;severity&#34; : &#34;LOW&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-36137&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-21716&#34;,&#xA;              &#34;title&#34; : &#34;An incomplete fix for CVE-2024-36137 leaves `FileHandle.chmod()` and `FileHandle.chown()` in the promises API without the required permission checks, while their callback-based equivalents (`fs.fchmod()`, `fs.fchown()`) were correctly patched.\r\n\r\nAs a result, code running under `--permission` with restricted `--allow-fs-write` can still use promise-based `FileHandle` methods to modify file permissions and ownership on already-open file descriptors, bypassing the intended write restrictions.\r\n\r\nThis vulnerability affects **20.x, 22.x, 24.x, and 25.x** processes using the Permission Model where `--allow-fs-write` is intentionally restricted.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 3.8,&#xA;              &#34;severity&#34; : &#34;LOW&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-21716&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-31124&#34;,&#xA;              &#34;title&#34; : &#34;AutoTools does not set CARES_RANDOM_FILE during cross compilation&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 3.7,&#xA;              &#34;severity&#34; : &#34;LOW&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-31124&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-23165&#34;,&#xA;              &#34;title&#34; : &#34;In Node.js, the `ReadFileUtf8` internal binding leaks memory due to a corrupted pointer in `uv_fs_s.file`: a UTF-16 path buffer is allocated but subsequently overwritten when the file descriptor is set. This results in an unrecoverable memory leak on every call. Repeated use can cause unbounded memory growth, leading to a denial of service.\r\n\r\nImpact:\r\n* This vulnerability affects APIs relying on `ReadFileUtf8` on Node.js release lines: v20 and v22.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 3.7,&#xA;              &#34;severity&#34; : &#34;LOW&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-23165&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-21715&#34;,&#xA;              &#34;title&#34; : &#34;A flaw in Node.js Permission Model filesystem enforcement leaves `fs.realpathSync.native()` without the required read permission checks, while all comparable filesystem functions correctly enforce them.\r\n\r\nAs a result, code running under `--permission` with restricted `--allow-fs-read` can still use `fs.realpathSync.native()` to check file existence, resolve symlink targets, and enumerate filesystem paths outside of permitted directories.\r\n\r\nThis vulnerability affects **20.x, 22.x, 24.x, and 25.x** processes using the Permission Model where `--allow-fs-read` is intentionally restricted.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 3.3,&#xA;              &#34;severity&#34; : &#34;LOW&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-21715&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-22018&#34;,&#xA;              &#34;title&#34; : &#34;A vulnerability has been identified in Node.js, affecting users of the experimental permission model when the --allow-fs-read flag is used.\nThis flaw arises from an inadequate permission model that fails to restrict file stats through the fs.lstat API. As a result, malicious actors can retrieve stats from files that they do not have explicit read access to.\nThis vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21.\nPlease note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 2.9,&#xA;              &#34;severity&#34; : &#34;LOW&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-22018&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2023-39332&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-39332&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;              &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.1,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=krb5-1.20.1-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39975&#34;,&#xA;                &#34;title&#34; : &#34;kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26462&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37370&#34;,&#xA;                &#34;title&#34; : &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37370&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-36054&#34;,&#xA;                &#34;title&#34; : &#34;lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-36054&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37371&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37371&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24528&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24528&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26458&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26461&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26461&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3576&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3576&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-devel@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-headers@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/kernel-headers@5.14.0-284.11.1.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=kernel-5.14.0-284.11.1.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-44466&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in net/ceph/messenger_v2.c in the Linux kernel before 6.4.5. There is an integer signedness error, leading to a buffer overflow and remote code execution via HELLO or one of the AUTH frames. This occurs because of an untrusted length taken from a TCP packet in ceph_decode_32.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5154&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5154&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21927&#34;,&#xA;                &#34;title&#34; : &#34;nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21927&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1652&#34;,&#xA;                &#34;title&#34; : &#34;A use-after-free flaw was found in nfsd4_ssc_setup_dul in fs/nfsd/nfs4proc.c in the NFS filesystem in the Linux Kernel. This issue could allow a local attacker to crash the system or it may lead to a kernel information leak problem.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1652&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-52922&#34;,&#xA;                &#34;title&#34; : &#34;can: bcm: Fix UAF in bcm_proc_show()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52922&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-36971&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-36971&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21756&#34;,&#xA;                &#34;title&#34; : &#34;vsock: Keep the binding until socket destruction&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21756&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22020&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22020&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38052&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38052&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38087&#34;,&#xA;                &#34;title&#34; : &#34;net/sched: fix use-after-free in taprio_dev_notifier&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38087&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-41723&#34;,&#xA;                &#34;title&#34; : &#34;Denial of service via crafted HTTP/2 stream in net/http and golang.org/x/net&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-41723&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38471&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38471&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-42284&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-42284&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-53104&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-53104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-37750&#34;,&#xA;                &#34;title&#34; : &#34;smb: client: fix UAF in decryption with multichannel&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-37750&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38250&#34;,&#xA;                &#34;title&#34; : &#34;Bluetooth: hci_core: Fix use-after-free in vhci_flush()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38250&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-49846&#34;,&#xA;                &#34;title&#34; : &#34;udf: Fix a slab-out-of-bounds write bug in udf_find_entry()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-49846&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-52933&#34;,&#xA;                &#34;title&#34; : &#34;Squashfs: fix handling and sanity checking of xattr_ids count&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52933&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-53751&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-53751&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6606&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6606&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6610&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6610&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-35937&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38538&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38538&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-53150&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-53150&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-57947&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-57947&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21887&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21887&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21893&#34;,&#xA;                &#34;title&#34; : &#34;keys: Fix UAF in key_put()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21893&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21920&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21969&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21969&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21979&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21979&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21993&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21993&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21997&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21997&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22026&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22026&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22055&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22055&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22104&#34;,&#xA;                &#34;title&#34; : &#34;ibmvnic: Use kernel helpers for hex dumps&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22113&#34;,&#xA;                &#34;title&#34; : &#34;ext4: avoid journaling sb update on error if journal is destroying&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22113&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22121&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22121&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-37738&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-37738&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-37799&#34;,&#xA;                &#34;title&#34; : &#34;vmxnet3: Fix malformed packet sizing in vmxnet3_process_xdp&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-37799&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38264&#34;,&#xA;                &#34;title&#34; : &#34;nvme-tcp: sanitize request list handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38264&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-49977&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-49977&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-50066&#34;,&#xA;                &#34;title&#34; : &#34;net: atlantic: fix aq_vec index out of range error&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-50066&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-53047&#34;,&#xA;                &#34;title&#34; : &#34;tee: amdtee: fix race condition in amdtee_open_session&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-53047&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-53107&#34;,&#xA;                &#34;title&#34; : &#34;veth: Fix use after free in XDP_REDIRECT&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-53107&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6932&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in Linux kernel&#39;s ipv4: igmp component&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6932&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0646&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0646&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-46858&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-46858&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50154&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50154&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-53141&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-53141&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21764&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21764&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21867&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21867&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21919&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21919&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21926&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21926&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21966&#34;,&#xA;                &#34;title&#34; : &#34;dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21966&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22004&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22004&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22126&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22126&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-37797&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-37797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-37803&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-37803&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-37890&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-37890&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-37914&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-37914&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-37943&#34;,&#xA;                &#34;title&#34; : &#34;wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-37943&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38079&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38079&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38086&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38086&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38124&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38124&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38177&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38177&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38200&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38200&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38332&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38332&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-50616&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-50616&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56614&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56614&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56615&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56615&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21883&#34;,&#xA;                &#34;title&#34; : &#34;ice: Fix deinitializing VF in error path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21883&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21928&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21928&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21929&#34;,&#xA;                &#34;title&#34; : &#34;HID: intel-ish-hid: Fix use-after-free issue in hid_ishtp_cl_remove()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21929&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21991&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21991&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22085&#34;,&#xA;                &#34;title&#34; : &#34;RDMA/core: Fix use-after-free when rename device name&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22085&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-47383&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-47383&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21759&#34;,&#xA;                &#34;title&#34; : &#34;ipv6: mcast: extend RCU protection in igmp6_send()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21759&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28746&#34;,&#xA;                &#34;title&#34; : &#34;Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28746&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6356&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6356&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6536&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6536&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-21823&#34;,&#xA;                &#34;title&#34; : &#34;Hardware logic with insecure de-synchronization in Intel(R) DSA and Intel(R) IAA for some Intel(R) 4th or 5th generation Xeon(R) processors may allow an authorized user to potentially enable escalation of privilege local access&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-21823&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21999&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21999&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38350&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38350&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-46695&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-46695&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50275&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50275&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-42292&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-42292&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50302&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50302&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-49395&#34;,&#xA;                &#34;title&#34; : &#34;um: Fix out-of-bounds read in LDT setup&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-49395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5090&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5090&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26664&#34;,&#xA;                &#34;title&#34; : &#34;hwmon: (coretemp) Fix out-of-bounds memory access&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26664&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50264&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50264&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38110&#34;,&#xA;                &#34;title&#34; : &#34;net/mdiobus: Fix potential out-of-bounds clause 45 read/write access&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38110&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-53122&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-53122&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-53197&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-53197&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-36941&#34;,&#xA;                &#34;title&#34; : &#34;wifi: nl80211: don&#39;t free NULL coalescing rule&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-36941&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38627&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38627&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-50042&#34;,&#xA;                &#34;title&#34; : &#34;net: genl: fix error path memory leak in policy dumping&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-50042&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1074&#34;,&#xA;                &#34;title&#34; : &#34;A memory leak flaw was found in the Linux kernel&#39;s Stream Control Transmission Protocol. This issue may occur when a user starts a malicious networking service and someone connects to this service. This could allow a local user to starve resources, causing a denial of service.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1074&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-45862&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in drivers/usb/storage/ene_ub6250.c for the ENE UB6250 reader driver in the Linux kernel before 6.2.5. An object could potentially extend beyond the end of an allocation.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-45862&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-52490&#34;,&#xA;                &#34;title&#34; : &#34;mm: migrate: fix getting incorrect page mapping during page migration&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-52658&#34;,&#xA;                &#34;title&#34; : &#34;Revert \&#34;net/mlx5: Block entering switchdev mode with ns inconsistency\&#34;&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52658&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-53597&#34;,&#xA;                &#34;title&#34; : &#34;cifs: fix mid leak during reconnection after timeout threshold&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-53597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-53704&#34;,&#xA;                &#34;title&#34; : &#34;clk: imx: clk-imx8mp: improve error handling in imx8mp_clocks_probe()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-53704&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-54004&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-54004&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-54093&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-54093&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-54271&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-54271&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-7192&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7192&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0443&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0443&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26615&#34;,&#xA;                &#34;title&#34; : &#34;net/smc: fix illegal rmb_desc access in SMC-D connection dump&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26615&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26878&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-27046&#34;,&#xA;                &#34;title&#34; : &#34;nfp: flower: handle acti_netdevs allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-27046&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-27052&#34;,&#xA;                &#34;title&#34; : &#34;wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-27052&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-35789&#34;,&#xA;                &#34;title&#34; : &#34;wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-35789&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-35852&#34;,&#xA;                &#34;title&#34; : &#34;mlxsw: spectrum_acl_tcam: Fix memory leak when canceling rehash work&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-35852&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-35890&#34;,&#xA;                &#34;title&#34; : &#34;gro: fix ownership transfer&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-35890&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-35907&#34;,&#xA;                &#34;title&#34; : &#34;mlxbf_gige: call request_irq() after NAPI initialized&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-35907&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-35952&#34;,&#xA;                &#34;title&#34; : &#34;drm/ast: Fix soft lockup&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-35952&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-35989&#34;,&#xA;                &#34;title&#34; : &#34;dmaengine: idxd: Fix oops during rmmod on single-CPU platforms&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-35989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-39483&#34;,&#xA;                &#34;title&#34; : &#34;KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright masked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-39483&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-40959&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40959&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-41035&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-41035&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-41064&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-41064&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-42079&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-42079&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-42272&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-42272&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-42283&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-42283&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-42322&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-42322&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-43854&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-43854&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-44990&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-44990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-44994&#34;,&#xA;                &#34;title&#34; : &#34;iommu: Restore lost return in iommu_report_device_fault()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-44994&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45018&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45018&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-46713&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-46713&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-46824&#34;,&#xA;                &#34;title&#34; : &#34;iommufd: Require drivers to supply the cache_invalidate_user ops&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-46824&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-49949&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-49949&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50208&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50208&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50251&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50251&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50252&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50252&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-53113&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-53113&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21669&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21669&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21962&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21962&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21963&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21963&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21964&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21964&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-37785&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-37785&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38234&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38234&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-52448&#34;,&#xA;                &#34;title&#34; : &#34;gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52448&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-53755&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-53755&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-47745&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-47745&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-53088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-53088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-21961&#34;,&#xA;                &#34;title&#34; : &#34;eth: bnxt: fix truesize for mb-xdp-pass case&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-21961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-22036&#34;,&#xA;                &#34;title&#34; : &#34;exfat: fix random stack corruption after get_block&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-22036&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-38417&#34;,&#xA;                &#34;title&#34; : &#34;ice: fix eswitch code memory leak in reset scenario&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-38417&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-52771&#34;,&#xA;                &#34;title&#34; : &#34;cxl/port: Fix delete_endpoint() vs parent unregistration race&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52771&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-52864&#34;,&#xA;                &#34;title&#34; : &#34;platform/x86: wmi: Fix opening of char device&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52864&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26855&#34;,&#xA;                &#34;title&#34; : &#34;net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26855&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-35845&#34;,&#xA;                &#34;title&#34; : &#34;wifi: iwlwifi: dbg-tlv: ensure NUL termination&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-35845&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-36922&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-36922&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38555&#34;,&#xA;                &#34;title&#34; : &#34;net/mlx5: Discard command completions in internal error&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38555&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38556&#34;,&#xA;                &#34;title&#34; : &#34;net/mlx5: Add a timeout to acquire the command queue semaphore&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38556&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-43855&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-43855&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-46826&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-46826&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26897&#34;,&#xA;                &#34;title&#34; : &#34;wifi: ath9k: delay all of ath9k_wmi_event_tasklet() until init is complete&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26897&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38586&#34;,&#xA;                &#34;title&#34; : &#34;r8169: Fix possible ring buffer corruption on fragmented Tx packets.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38586&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-50846&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-50846&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-53639&#34;,&#xA;                &#34;title&#34; : &#34;wifi: ath6kl: reduce WARN to dev_dbg() in callback&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-53639&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-54153&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-54153&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-54267&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-54267&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-44466&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in net/ceph/messenger_v2.c in the Linux kernel before 6.4.5. There is an integer signedness error, leading to a buffer overflow and remote code execution via HELLO or one of the AUTH frames. This occurs because of an untrusted length taken from a TCP packet in ceph_decode_32.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=curl-7.76.1-23.el9_2.1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2398&#34;,&#xA;                &#34;title&#34; : &#34;HTTP/2 push headers memory-leak&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2398&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27536&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists libcurl &lt;8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27536&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28321&#34;,&#xA;                &#34;title&#34; : &#34;An improper certificate validation vulnerability exists in curl &lt;v8.1.0 in the way it supports matching of wildcard patterns when listed as \&#34;Subject Alternative Name\&#34; in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28321&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27538&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27538&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-46218&#34;,&#xA;                &#34;title&#34; : &#34;This flaw allows a malicious HTTP server to set \&#34;super cookies\&#34; in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl&#39;s function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-46218&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9086&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9086&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27533&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability in input validation exists in curl &lt;8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \&#34;telnet options\&#34; during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application&#39;s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27534&#34;,&#xA;                &#34;title&#34; : &#34;A path traversal vulnerability exists in curl &lt;8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27534&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28322&#34;,&#xA;                &#34;title&#34; : &#34;An information disclosure vulnerability exists in curl &lt;v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28322&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38546&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38546&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=nghttp2-1.43.0-5.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27135&#34;,&#xA;                &#34;title&#34; : &#34;nghttp2 Denial of service: Assertion failure due to the missing state validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27135&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28182&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28182&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=gmp-6.2.0-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/cpp@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libquadmath@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgfortran@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgomp@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=binutils-2.35.2-37.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2022-4285&#34;,&#xA;                &#34;title&#34; : &#34;An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a denial of service. This issue is the result of an incomplete fix for CVE-2020-16599.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-4285&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11082&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elf-eh-frame.c _bfd_elf_parse_eh_frame heap-based overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11082&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11083&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elfcode.h elf_swap_shdr heap-based overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11083&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5244&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils ld elflink.c elf_gc_sweep memory corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5244&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2022-4285&#34;,&#xA;                &#34;title&#34; : &#34;An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a denial of service. This issue is the result of an incomplete fix for CVE-2020-16599.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-4285&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/binutils@2.35.2-37.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=binutils-2.35.2-37.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2022-4285&#34;,&#xA;                &#34;title&#34; : &#34;An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a denial of service. This issue is the result of an incomplete fix for CVE-2020-16599.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-4285&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11081&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils objdump.c dump_dwarf_section out-of-bounds&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11081&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11082&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elf-eh-frame.c _bfd_elf_parse_eh_frame heap-based overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11082&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11083&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elfcode.h elf_swap_shdr heap-based overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11083&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11413&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elflink.c elf_link_add_object_symbols out-of-bounds&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11413&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5244&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils ld elflink.c elf_gc_sweep memory corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5244&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11412&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elflink.c bfd_elf_gc_record_vtentry out-of-bounds&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11412&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11414&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elflink.c get_link_hash_entry out-of-bounds&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11414&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11494&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elfxx-x86.c _bfd_x86_elf_late_size_sections out-of-bounds&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11494&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11495&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils Linker elf64-x86-64.c elf_x86_64_relocate_section heap-based overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11495&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11839&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils prdbg.c tg_tag_type return value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11839&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11840&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils ldmisc.c vfinfo out-of-bounds&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11840&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66861&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66862&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66862&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66863&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66863&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66864&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66864&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66866&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66866&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69647&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69647&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69648&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69648&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69649&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69649&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69650&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils thru 2.46 readelf contains a double free vulnerability when processing a crafted ELF binary with malformed relocation data. During GOT relocation handling, dump_relocations may return early without initializing the all_relocations array. As a result, process_got_section_contents() may pass an uninitialized r_symbol pointer to free(), leading to a double free and terminating the program with SIGABRT. No evidence of exploitable memory corruption or code execution was observed; the impact is limited to denial of service. NOTE: this is disputed by third parties because the observed behavior occurred only in pre-release code and did not affect any tagged version.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69652&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69652&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69645&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.8,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69645&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69646&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.8,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69646&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69651&#34;,&#xA;                &#34;title&#34; : &#34;GNU Binutils thru 2.46 readelf contains a vulnerability that leads to an invalid pointer free when processing a crafted ELF binary with malformed relocation or symbol data. If dump_relocations returns early due to parsing errors, the internal all_relocations array may remain partially uninitialized. Later, process_got_section_contents() may attempt to free an invalid r_symbol pointer, triggering memory corruption checks in glibc and causing the program to terminate with SIGABRT. No evidence of further memory corruption or code execution was observed; the impact is limited to denial of service. NOTE: this is disputed by third parties because the observed behavior occurred only in pre-release code and did not affect any tagged version.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.8,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69651&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2022-4285&#34;,&#xA;                &#34;title&#34; : &#34;An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a denial of service. This issue is the result of an incomplete fix for CVE-2020-16599.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-4285&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gdb-10.2-10.el9.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2021-3826&#34;,&#xA;              &#34;title&#34; : &#34;Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2021-3826&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=krb5-1.20.1-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39975&#34;,&#xA;                &#34;title&#34; : &#34;kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26462&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37370&#34;,&#xA;                &#34;title&#34; : &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37370&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-36054&#34;,&#xA;                &#34;title&#34; : &#34;lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-36054&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37371&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37371&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24528&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24528&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26458&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26461&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26461&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3576&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3576&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-setuptools-53.0.0-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-47273&#34;,&#xA;                &#34;title&#34; : &#34;setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-47273&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=curl-7.76.1-23.el9_2.1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2398&#34;,&#xA;                &#34;title&#34; : &#34;HTTP/2 push headers memory-leak&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2398&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27536&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists libcurl &lt;8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27536&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28321&#34;,&#xA;                &#34;title&#34; : &#34;An improper certificate validation vulnerability exists in curl &lt;v8.1.0 in the way it supports matching of wildcard patterns when listed as \&#34;Subject Alternative Name\&#34; in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28321&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27538&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27538&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-46218&#34;,&#xA;                &#34;title&#34; : &#34;This flaw allows a malicious HTTP server to set \&#34;super cookies\&#34; in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl&#39;s function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-46218&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9086&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9086&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27533&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability in input validation exists in curl &lt;8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \&#34;telnet options\&#34; during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application&#39;s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27534&#34;,&#xA;                &#34;title&#34; : &#34;A path traversal vulnerability exists in curl &lt;8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27534&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28322&#34;,&#xA;                &#34;title&#34; : &#34;An information disclosure vulnerability exists in curl &lt;v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28322&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38546&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38546&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=sqlite-3.34.1-6.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-7104&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3277&#34;,&#xA;                &#34;title&#34; : &#34;An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3277&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glib2-2.68.4-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13601&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in in g_escape_uri_string()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-52533&#34;,&#xA;                &#34;title&#34; : &#34;gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing &#39;\\0&#39; character.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-52533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32611&#34;,&#xA;                &#34;title&#34; : &#34;G_variant_byteswap() can take a long time with some non-normal inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32611&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32665&#34;,&#xA;                &#34;title&#34; : &#34;Gvariant deserialisation does not match spec for non-normal data&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32665&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14512&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in glib gio attribute escaping causes heap buffer overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14512&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-29499&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29499&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14087&#34;,&#xA;                &#34;title&#34; : &#34;Glib: glib: buffer underflow in gvariant parser leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14087&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4373&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4373&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-34397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.8,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-34397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7039&#34;,&#xA;                &#34;title&#34; : &#34;Glib: buffer under-read on glib through glib/gfileutils.c via get_tmp_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7039&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0988&#34;,&#xA;                &#34;title&#34; : &#34;Glib: glib: denial of service via integer overflow in g_buffered_input_stream_peek()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0988&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13601&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in in g_escape_uri_string()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gnutls-3.7.6-20.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-0553&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: incomplete fix for cve-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0553&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0567&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0567&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32988&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls othername san export&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32988&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32990&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls certtool template parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6395&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: null pointer dereference in _gnutls_figure_common_ciphersuite()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5981&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12243&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: gnutls impacted by inefficient der decoding in libtasn1 leading to remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12243&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28834&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28834&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14831&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: gnutls: denial of service via excessive resource consumption during certificate verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14831&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32989&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls sct extension parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28835&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28835&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9820&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: stack-based buffer overflow in gnutls_pkcs11_token_init() function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9820&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-0553&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: incomplete fix for cve-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0553&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=nghttp2-1.43.0-5.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27135&#34;,&#xA;                &#34;title&#34; : &#34;nghttp2 Denial of service: Assertion failure due to the missing state validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27135&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28182&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28182&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=expat-2.5.0-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28757&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45490&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8176&#34;,&#xA;                &#34;title&#34; : &#34;Libexpat: expat: improper restriction of xml entity expansion depth in libexpat&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45492&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45492&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50602&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59375&#34;,&#xA;                &#34;title&#34; : &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59375&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41080&#34;,&#xA;                &#34;title&#34; : &#34;libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41080&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libicu@67.1-9.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=icu-67.1-9.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-5222&#34;,&#xA;                &#34;title&#34; : &#34;Icu: stack buffer overflow in the srbroot::addtag function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5222&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-5222&#34;,&#xA;                &#34;title&#34; : &#34;Icu: stack buffer overflow in the srbroot::addtag function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5222&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gdb-10.2-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-3826&#34;,&#xA;                &#34;title&#34; : &#34;Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-3826&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-3826&#34;,&#xA;                &#34;title&#34; : &#34;Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-3826&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=gmp-6.2.0-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27456&#34;,&#xA;                &#34;title&#34; : &#34;util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27456&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3184&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: access control bypass due to improper hostname canonicalization&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3184&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-pip-21.2.3-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=openldap-2.6.2-3.el9.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;              &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.1,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28390&#34;,&#xA;                &#34;title&#34; : &#34;Possible NULL Dereference When Processing CMS KeyTransportRecipientInfo&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28390&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9231&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9231&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28388&#34;,&#xA;                &#34;title&#34; : &#34;NULL Pointer Dereference When Processing a Delta CRL&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28388&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28389&#34;,&#xA;                &#34;title&#34; : &#34;Possible NULL Dereference When Processing CMS KeyAgreeRecipientInfo&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28389&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-31790&#34;,&#xA;                &#34;title&#34; : &#34;Incorrect Failure Handling in RSA KEM RSASVE Encapsulation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-31790&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-31789&#34;,&#xA;                &#34;title&#34; : &#34;Heap Buffer Overflow in Hexadecimal Conversion&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-31789&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28386&#34;,&#xA;                &#34;title&#34; : &#34;Out-of-bounds Read in AES-CFB-128 on X86-64 with AVX-512 Support&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28386&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28387&#34;,&#xA;                &#34;title&#34; : &#34;Potential Use-after-free in DANE Client Code&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28387&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.1,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2673&#34;,&#xA;                &#34;title&#34; : &#34;OpenSSL TLS 1.3 server may choose unexpected key agreement group&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.1,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2673&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=krb5-1.20.1-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39975&#34;,&#xA;                &#34;title&#34; : &#34;kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26462&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37370&#34;,&#xA;                &#34;title&#34; : &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37370&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-36054&#34;,&#xA;                &#34;title&#34; : &#34;lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-36054&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37371&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37371&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24528&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24528&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26458&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26461&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26461&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3576&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3576&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/pam@1.5.1-14.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=pam-1.5.1-14.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6020&#34;,&#xA;                &#34;title&#34; : &#34;Linux-pam: linux-pam directory traversal&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6020&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8941&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8941&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-10963&#34;,&#xA;                &#34;title&#34; : &#34;Pam: improper hostname interpretation in pam_access leads to access control bypass&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-10963&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-22365&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-22365&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-10041&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-10041&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6020&#34;,&#xA;                &#34;title&#34; : &#34;Linux-pam: linux-pam directory traversal&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6020&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/systemd@252-13.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=systemd-252-13.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-29111&#34;,&#xA;                &#34;title&#34; : &#34;systemd: Local unprivileged user can trigger an assert&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-29111&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-40224&#34;,&#xA;                &#34;title&#34; : &#34;In systemd 259 before 260, there is local privilege escalation in systemd-machined because varlink can be used to reach the root namespace.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-40224&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4105&#34;,&#xA;                &#34;title&#34; : &#34;Systemd: systemd: privilege escalation via improper access control in registermachine d-bus method&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4105&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-40225&#34;,&#xA;                &#34;title&#34; : &#34;In udev in systemd before 260, local root execution can occur via malicious hardware devices and unsanitized kernel output.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-40225&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-40226&#34;,&#xA;                &#34;title&#34; : &#34;In nspawn in systemd 233 through 259 before 260, an escape-to-host action can occur via a crafted optional config file.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-40226&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-40227&#34;,&#xA;                &#34;title&#34; : &#34;In systemd 260 before 261, a local unprivileged user can trigger an assert via an IPC API call with an array or map that has a null element.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-40227&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4598&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4598&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-40223&#34;,&#xA;                &#34;title&#34; : &#34;In systemd 258 before 260, a local unprivileged user can trigger an assert when a Delegate=yes and User=&lt;unset&gt; unit exists and is running.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-40223&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-40228&#34;,&#xA;                &#34;title&#34; : &#34;In systemd 259, systemd-journald can send ANSI escape sequences to the terminals of arbitrary users when a \&#34;logger -p emerg\&#34; command is executed, if ForwardToWall=yes is set.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.9,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-40228&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-29111&#34;,&#xA;                &#34;title&#34; : &#34;systemd: Local unprivileged user can trigger an assert&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-29111&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libgcrypt-1.10.0-10.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2236&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2236&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41990&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 mishandles Dilithium signing. Writes to a static array lack a bounds check but do not use attacker-controlled data.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=expat-2.5.0-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28757&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45490&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8176&#34;,&#xA;                &#34;title&#34; : &#34;Libexpat: expat: improper restriction of xml entity expansion depth in libexpat&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45492&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45492&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50602&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59375&#34;,&#xA;                &#34;title&#34; : &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59375&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41080&#34;,&#xA;                &#34;title&#34; : &#34;libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41080&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openldap@2.6.2-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=openldap-2.6.2-3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libeconf@0.4.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libeconf-0.4.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-22652&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in \&#34;read_file\&#34; function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-22652&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-22652&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in \&#34;read_file\&#34; function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-22652&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/dbus-common@1.12.20-7.el9_1?arch=noarch&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=dbus-1.12.20-7.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-34969&#34;,&#xA;                &#34;title&#34; : &#34;D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-34969&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-34969&#34;,&#xA;                &#34;title&#34; : &#34;D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-34969&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=dbus-1.12.20-7.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-34969&#34;,&#xA;                &#34;title&#34; : &#34;D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-34969&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-34969&#34;,&#xA;                &#34;title&#34; : &#34;D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-34969&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=gmp-6.2.0-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27456&#34;,&#xA;                &#34;title&#34; : &#34;util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27456&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3184&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: access control bypass due to improper hostname canonicalization&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3184&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libsmartcols@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/util-linux@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27456&#34;,&#xA;                &#34;title&#34; : &#34;util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27456&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3184&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: access control bypass due to improper hostname canonicalization&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3184&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libfdisk@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/util-linux-core@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/systemd-pam@252-13.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=systemd-252-13.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4598&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4598&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/systemd-rpm-macros@252-13.el9_2?arch=noarch&amp;distro=rhel-9.2&amp;upstream=systemd-252-13.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4598&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4598&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/systemd-libs@252-13.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=systemd-252-13.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4598&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4598&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=2&amp;upstream=shadow-utils-4.9-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-4641&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4641&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56433&#34;,&#xA;                &#34;title&#34; : &#34;shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.6,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56433&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-4641&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4641&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-ethtool@0.15-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python-ethtool-0.15-2.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-setuptools-53.0.0-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-47273&#34;,&#xA;                &#34;title&#34; : &#34;setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-47273&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5713&#34;,&#xA;                &#34;title&#34; : &#34;Out-of-bounds read/write during remote profiling and asyncio process introspection when connecting to malicious target&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5713&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13837&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13837&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4224&#34;,&#xA;                &#34;title&#34; : &#34;Stack overflow parsing XML with deeply nested DTD content models&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4224&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3644&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete control character validation in http.cookies&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3644&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12781&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12781&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3446&#34;,&#xA;                &#34;title&#34; : &#34;Base64 decoding stops at first padded quad by default&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15282&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15282&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1502&#34;,&#xA;                &#34;title&#34; : &#34;HTTP client proxy tunnel headers not validated for CR/LF&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1502&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2297&#34;,&#xA;                &#34;title&#34; : &#34;SourcelessFileLoader does not use io.open_code()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2297&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3479&#34;,&#xA;                &#34;title&#34; : &#34;pkgutil.get_data() does not enforce documented restrictions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3479&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13462&#34;,&#xA;                &#34;title&#34; : &#34;tarfile: Skip DIRTYPE normalization during GNU LONGNAME/LONGLINK handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=sqlite-3.34.1-6.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-7104&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3277&#34;,&#xA;                &#34;title&#34; : &#34;An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3277&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=expat-2.5.0-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28757&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45490&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8176&#34;,&#xA;                &#34;title&#34; : &#34;Libexpat: expat: improper restriction of xml entity expansion depth in libexpat&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45492&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45492&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50602&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59375&#34;,&#xA;                &#34;title&#34; : &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59375&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41080&#34;,&#xA;                &#34;title&#34; : &#34;libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41080&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-pip-21.2.3-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/libkadm5@1.20.1-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=krb5-1.20.1-8.el9.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.0,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-39975&#34;,&#xA;              &#34;title&#34; : &#34;kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-39975&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-26462&#34;,&#xA;              &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-26462&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-37370&#34;,&#xA;              &#34;title&#34; : &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-37370&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-36054&#34;,&#xA;              &#34;title&#34; : &#34;lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-36054&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-37371&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-37371&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-24528&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-24528&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-26458&#34;,&#xA;              &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-26458&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-26461&#34;,&#xA;              &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-26461&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-3576&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-3576&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=krb5-1.20.1-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39975&#34;,&#xA;                &#34;title&#34; : &#34;kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26462&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37370&#34;,&#xA;                &#34;title&#34; : &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37370&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-36054&#34;,&#xA;                &#34;title&#34; : &#34;lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-36054&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37371&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37371&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24528&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24528&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26458&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26461&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26461&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3576&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3576&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=gmp-6.2.0-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch&amp;distro=rhel-9.2&amp;upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libxml2-2.9.13-3.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49794&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: heap use after free (uaf) leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49794&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49796&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: type confusion leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56171&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56171&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24928&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24928&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7425&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: libxml2: heap use-after-free in libxslt caused by atype corruption in xmlattrptr&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-25062&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-25062&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32415&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32415&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49795&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: null pointer dereference leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6021&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6021&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7424&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: type confusion in xmlnode.psvi between stylesheet and source nodes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7424&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39615&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39615&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6732&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via crafted xsd-validated document&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6732&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9714&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9714&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1757&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: memory leak leading to local denial of service in xmllint interactive shell&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-49043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-49043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28484&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28484&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-29469&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the &#39;\\0&#39; value).&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0990&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via uncontrolled recursion in xml catalog processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32414&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32414&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-26434&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2, there is a possible out of bounds read due to a buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-26434&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0989&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: unbounded relaxng include recursion leading to stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0992&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via crafted xml catalogs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.9,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0992&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6170&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: stack buffer overflow in xmllint interactive shell command handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6170&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=krb5-1.20.1-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39975&#34;,&#xA;                &#34;title&#34; : &#34;kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26462&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37370&#34;,&#xA;                &#34;title&#34; : &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37370&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-36054&#34;,&#xA;                &#34;title&#34; : &#34;lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-36054&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37371&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37371&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24528&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24528&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26458&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26461&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26461&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3576&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3576&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-setuptools-53.0.0-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-47273&#34;,&#xA;                &#34;title&#34; : &#34;setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-47273&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5713&#34;,&#xA;                &#34;title&#34; : &#34;Out-of-bounds read/write during remote profiling and asyncio process introspection when connecting to malicious target&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5713&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13837&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13837&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4224&#34;,&#xA;                &#34;title&#34; : &#34;Stack overflow parsing XML with deeply nested DTD content models&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4224&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3644&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete control character validation in http.cookies&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3644&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12781&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12781&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3446&#34;,&#xA;                &#34;title&#34; : &#34;Base64 decoding stops at first padded quad by default&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15282&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15282&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1502&#34;,&#xA;                &#34;title&#34; : &#34;HTTP client proxy tunnel headers not validated for CR/LF&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1502&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2297&#34;,&#xA;                &#34;title&#34; : &#34;SourcelessFileLoader does not use io.open_code()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2297&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3479&#34;,&#xA;                &#34;title&#34; : &#34;pkgutil.get_data() does not enforce documented restrictions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3479&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13462&#34;,&#xA;                &#34;title&#34; : &#34;tarfile: Skip DIRTYPE normalization during GNU LONGNAME/LONGLINK handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcomps@0.1.18-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcomps-0.1.18-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-1312&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1312&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0980&#34;,&#xA;                &#34;title&#34; : &#34;Rubyipmi: red hat satellite: remote code execution in rubyipmi via malicious bmc username&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0980&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1207&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1207&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1530&#34;,&#xA;                &#34;title&#34; : &#34;Fog-kubevirt: fog-kubevirt: man-in-the-middle vulnerability due to disabled certificate validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1530&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1531&#34;,&#xA;                &#34;title&#34; : &#34;Foreman-kubevirt: foreman_kubevirt: man-in-the-middle due to insecure default ssl verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1531&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1961&#34;,&#xA;                &#34;title&#34; : &#34;Forman: foreman: remote code execution via command injection in websocket proxy&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-46877&#34;,&#xA;                &#34;title&#34; : &#34;jackson-databind 2.10.x through 2.12.x before 2.12.6 and 2.13.x before 2.13.1 allows attackers to cause a denial of service (2 GB transient heap usage per read) in uncommon situations involving JsonNode JDK serialization.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-46877&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14550&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14550&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6176&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1285&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1285&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68121&#34;,&#xA;                &#34;title&#34; : &#34;Unexpected session resumption in crypto/tls&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68121&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28863&#34;,&#xA;                &#34;title&#34; : &#34;node-tar vulnerable to denial of service while parsing a tar file due to lack of folders count validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28863&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4324&#34;,&#xA;                &#34;title&#34; : &#34;Rubygem-katello: katello: denial of service and potential information disclosure via sql injection&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4324&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-1312&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1312&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-libcomps@0.1.18-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcomps-0.1.18-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-1312&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1312&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0980&#34;,&#xA;                &#34;title&#34; : &#34;Rubyipmi: red hat satellite: remote code execution in rubyipmi via malicious bmc username&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0980&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1207&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1207&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1530&#34;,&#xA;                &#34;title&#34; : &#34;Fog-kubevirt: fog-kubevirt: man-in-the-middle vulnerability due to disabled certificate validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1530&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1531&#34;,&#xA;                &#34;title&#34; : &#34;Foreman-kubevirt: foreman_kubevirt: man-in-the-middle due to insecure default ssl verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1531&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1961&#34;,&#xA;                &#34;title&#34; : &#34;Forman: foreman: remote code execution via command injection in websocket proxy&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-46877&#34;,&#xA;                &#34;title&#34; : &#34;jackson-databind 2.10.x through 2.12.x before 2.12.6 and 2.13.x before 2.13.1 allows attackers to cause a denial of service (2 GB transient heap usage per read) in uncommon situations involving JsonNode JDK serialization.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-46877&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14550&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14550&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6176&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1285&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1285&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68121&#34;,&#xA;                &#34;title&#34; : &#34;Unexpected session resumption in crypto/tls&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68121&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28863&#34;,&#xA;                &#34;title&#34; : &#34;node-tar vulnerable to denial of service while parsing a tar file due to lack of folders count validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28863&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4324&#34;,&#xA;                &#34;title&#34; : &#34;Rubygem-katello: katello: denial of service and potential information disclosure via sql injection&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4324&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-1312&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1312&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gnupg2-2.3.3-2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-24882&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-24882&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68973&#34;,&#xA;                &#34;title&#34; : &#34;In GnuPG before 2.4.9, armor_filter in g10/armor.c has two increments of an index variable where one is intended, leading to an out-of-bounds write for crafted input. (For ExtendedLTS, 2.2.51 and later are fixed versions.)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68973&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68972&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68972&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-24882&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-24882&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=curl-7.76.1-23.el9_2.1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2398&#34;,&#xA;                &#34;title&#34; : &#34;HTTP/2 push headers memory-leak&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2398&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27536&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists libcurl &lt;8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27536&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28321&#34;,&#xA;                &#34;title&#34; : &#34;An improper certificate validation vulnerability exists in curl &lt;v8.1.0 in the way it supports matching of wildcard patterns when listed as \&#34;Subject Alternative Name\&#34; in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28321&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27538&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27538&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-46218&#34;,&#xA;                &#34;title&#34; : &#34;This flaw allows a malicious HTTP server to set \&#34;super cookies\&#34; in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl&#39;s function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-46218&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9086&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9086&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27533&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability in input validation exists in curl &lt;8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \&#34;telnet options\&#34; during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application&#39;s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27534&#34;,&#xA;                &#34;title&#34; : &#34;A path traversal vulnerability exists in curl &lt;8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27534&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28322&#34;,&#xA;                &#34;title&#34; : &#34;An information disclosure vulnerability exists in curl &lt;v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28322&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38546&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38546&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=curl-7.76.1-23.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2398&#34;,&#xA;                &#34;title&#34; : &#34;HTTP/2 push headers memory-leak&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2398&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27535&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl &lt;8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27536&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists libcurl &lt;8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27536&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28321&#34;,&#xA;                &#34;title&#34; : &#34;An improper certificate validation vulnerability exists in curl &lt;v8.1.0 in the way it supports matching of wildcard patterns when listed as \&#34;Subject Alternative Name\&#34; in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28321&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27538&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27538&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-46218&#34;,&#xA;                &#34;title&#34; : &#34;This flaw allows a malicious HTTP server to set \&#34;super cookies\&#34; in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl&#39;s function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-46218&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9086&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9086&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27533&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability in input validation exists in curl &lt;8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \&#34;telnet options\&#34; during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application&#39;s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27534&#34;,&#xA;                &#34;title&#34; : &#34;A path traversal vulnerability exists in curl &lt;8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27534&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28322&#34;,&#xA;                &#34;title&#34; : &#34;An information disclosure vulnerability exists in curl &lt;v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28322&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38546&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38546&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libarchive-3.5.3-4.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-5914&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5914&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4111&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: infinite loop denial of service in rar5 decompression via archive_read_data() in libarchive&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4111&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4424&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: libarchive: information disclosure via heap out-of-bounds read in rar archive processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4424&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5121&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: libarchive: arbitrary code execution via integer overflow in iso9660 image processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5121&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-60753&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-60753&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-57970&#34;,&#xA;                &#34;title&#34; : &#34;libarchive through 3.7.7 has a heap-based buffer over-read in header_gnu_longlink in archive_read_support_format_tar.c via a TAR archive because it mishandles truncation in the middle of a GNU long linkname.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-57970&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-25724&#34;,&#xA;                &#34;title&#34; : &#34;list_item_verbose in tar/util.c in libarchive through 3.7.7 does not check an strftime return value, which can lead to a denial of service or unspecified other impact via a crafted TAR archive that is read with a verbose value of 2. For example, the 100-byte buffer may not be sufficient for a custom locale.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-25724&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-5914&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5914&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glib2-2.68.4-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13601&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in in g_escape_uri_string()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-52533&#34;,&#xA;                &#34;title&#34; : &#34;gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing &#39;\\0&#39; character.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-52533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32611&#34;,&#xA;                &#34;title&#34; : &#34;G_variant_byteswap() can take a long time with some non-normal inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32611&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32665&#34;,&#xA;                &#34;title&#34; : &#34;Gvariant deserialisation does not match spec for non-normal data&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32665&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14512&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in glib gio attribute escaping causes heap buffer overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14512&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-29499&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29499&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14087&#34;,&#xA;                &#34;title&#34; : &#34;Glib: glib: buffer underflow in gvariant parser leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14087&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4373&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4373&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-34397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.8,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-34397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7039&#34;,&#xA;                &#34;title&#34; : &#34;Glib: buffer under-read on glib through glib/gfileutils.c via get_tmp_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7039&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0988&#34;,&#xA;                &#34;title&#34; : &#34;Glib: glib: denial of service via integer overflow in g_buffered_input_stream_peek()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0988&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13601&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in in g_escape_uri_string()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=sqlite-3.34.1-6.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-7104&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3277&#34;,&#xA;                &#34;title&#34; : &#34;An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3277&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=expat-2.5.0-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28757&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45490&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8176&#34;,&#xA;                &#34;title&#34; : &#34;Libexpat: expat: improper restriction of xml entity expansion depth in libexpat&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45492&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45492&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50602&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59375&#34;,&#xA;                &#34;title&#34; : &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59375&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41080&#34;,&#xA;                &#34;title&#34; : &#34;libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41080&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=nghttp2-1.43.0-5.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27135&#34;,&#xA;                &#34;title&#34; : &#34;nghttp2 Denial of service: Assertion failure due to the missing state validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27135&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28182&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28182&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gnutls-3.7.6-20.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-0553&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: incomplete fix for cve-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0553&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0567&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0567&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32988&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls othername san export&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32988&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32990&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls certtool template parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6395&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: null pointer dereference in _gnutls_figure_common_ciphersuite()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5981&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12243&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: gnutls impacted by inefficient der decoding in libtasn1 leading to remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12243&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28834&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28834&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14831&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: gnutls: denial of service via excessive resource consumption during certificate verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14831&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32989&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls sct extension parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28835&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28835&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9820&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: stack-based buffer overflow in gnutls_pkcs11_token_init() function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9820&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-0553&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: incomplete fix for cve-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0553&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libgcrypt-1.10.0-10.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2236&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2236&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41990&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 mishandles Dilithium signing. Writes to a static array lack a bounds check but do not use attacker-controlled data.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=openldap-2.6.2-3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openldap@2.6.2-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=openldap-2.6.2-3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/rpm-sign-libs@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/rpm-build-libs@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-rpm@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/rpm@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/tpm2-tss@3.0.3-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=tpm2-tss-3.0.3-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-22745&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-22745&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-22745&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-22745&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/dbus-libs@1.12.20-7.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=dbus-1.12.20-7.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-34969&#34;,&#xA;                &#34;title&#34; : &#34;D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-34969&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-34969&#34;,&#xA;                &#34;title&#34; : &#34;D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-34969&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=gmp-6.2.0-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libsmartcols@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27456&#34;,&#xA;                &#34;title&#34; : &#34;util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27456&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3184&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: access control bypass due to improper hostname canonicalization&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3184&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgomp@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/systemd-libs@252-13.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=systemd-252-13.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4598&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4598&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-pip-21.2.3-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/file-libs@5.39-12.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=file-5.39-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2022-48554&#34;,&#xA;                &#34;title&#34; : &#34;File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: \&#34;File\&#34; is the name of an Open Source project.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-48554&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2022-48554&#34;,&#xA;                &#34;title&#34; : &#34;File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: \&#34;File\&#34; is the name of an Open Source project.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-48554&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=2&amp;upstream=shadow-utils-4.9-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-4641&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4641&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56433&#34;,&#xA;                &#34;title&#34; : &#34;shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.6,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56433&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-4641&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4641&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-urllib3-1.26.5-3.el9.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2025-66418&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-66418&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-66471&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-66471&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-21441&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-21441&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-7143&#34;,&#xA;              &#34;title&#34; : &#34;Pulpcore: rbac permissions incorrectly assigned in tasks that create objects&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.7,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-7143&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-43804&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-43804&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-37891&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 4.4,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-37891&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-45803&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 4.2,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-45803&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-setuptools-53.0.0-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-47273&#34;,&#xA;                &#34;title&#34; : &#34;setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-47273&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5713&#34;,&#xA;                &#34;title&#34; : &#34;Out-of-bounds read/write during remote profiling and asyncio process introspection when connecting to malicious target&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5713&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13837&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13837&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4224&#34;,&#xA;                &#34;title&#34; : &#34;Stack overflow parsing XML with deeply nested DTD content models&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4224&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3644&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete control character validation in http.cookies&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3644&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12781&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12781&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3446&#34;,&#xA;                &#34;title&#34; : &#34;Base64 decoding stops at first padded quad by default&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15282&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15282&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1502&#34;,&#xA;                &#34;title&#34; : &#34;HTTP client proxy tunnel headers not validated for CR/LF&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1502&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2297&#34;,&#xA;                &#34;title&#34; : &#34;SourcelessFileLoader does not use io.open_code()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2297&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3479&#34;,&#xA;                &#34;title&#34; : &#34;pkgutil.get_data() does not enforce documented restrictions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3479&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13462&#34;,&#xA;                &#34;title&#34; : &#34;tarfile: Skip DIRTYPE normalization during GNU LONGNAME/LONGLINK handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=sqlite-3.34.1-6.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-7104&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3277&#34;,&#xA;                &#34;title&#34; : &#34;An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3277&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=expat-2.5.0-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28757&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45490&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8176&#34;,&#xA;                &#34;title&#34; : &#34;Libexpat: expat: improper restriction of xml entity expansion depth in libexpat&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45492&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45492&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50602&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59375&#34;,&#xA;                &#34;title&#34; : &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59375&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41080&#34;,&#xA;                &#34;title&#34; : &#34;libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41080&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-idna@2.10-7.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-idna-2.10-7.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-3651&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3651&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-3651&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3651&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-pip-21.2.3-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=httpd-2.4.53-11.el9_2.5.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;              &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-38475&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.1,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-38475&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-38476&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.1,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-38476&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-27522&#34;,&#xA;              &#34;title&#34; : &#34;Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-27522&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-31122&#34;,&#xA;              &#34;title&#34; : &#34;Apache HTTP Server: mod_macro buffer over-read&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-31122&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-38477&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-38477&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-47252&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-47252&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-23048&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-23048&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-49812&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-49812&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-39573&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.4,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-39573&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-58098&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.1,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-58098&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-38709&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.8,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-38709&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-65082&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-65082&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-66200&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.4,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-66200&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-38473&#34;,&#xA;              &#34;title&#34; : &#34;Apache HTTP Server proxy encoding problem&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-38473&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-24795&#34;,&#xA;              &#34;title&#34; : &#34;Apache HTTP Server: HTTP Response Splitting in multiple modules&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 4.0,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-24795&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.5?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=httpd-2.4.53-11.el9_2.5.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38475&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38475&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38476&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38476&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27522&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27522&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-31122&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_macro buffer over-read&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31122&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38477&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38477&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-47252&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-47252&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-23048&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-23048&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49812&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49812&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-39573&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-39573&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-58098&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-58098&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38709&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38709&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-65082&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-65082&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66200&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66200&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38473&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server proxy encoding problem&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38473&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-24795&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: HTTP Response Splitting in multiple modules&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-24795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.5?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=httpd-2.4.53-11.el9_2.5.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38475&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38475&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38476&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38476&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27522&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27522&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-31122&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_macro buffer over-read&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31122&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38477&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38477&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-47252&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-47252&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-23048&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-23048&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49812&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49812&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-39573&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-39573&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-58098&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-58098&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38709&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38709&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-65082&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-65082&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66200&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66200&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38473&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server proxy encoding problem&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38473&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-24795&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: HTTP Response Splitting in multiple modules&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-24795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/httpd-filesystem@2.4.53-11.el9_2.5?arch=noarch&amp;distro=rhel-9.2&amp;upstream=httpd-2.4.53-11.el9_2.5.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38475&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38475&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38476&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38476&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27522&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27522&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-31122&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: mod_macro buffer over-read&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31122&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38477&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38477&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-47252&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-47252&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-23048&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-23048&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49812&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49812&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59775&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59775&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-39573&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-39573&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-58098&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-58098&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38709&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38709&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-65082&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-65082&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66200&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66200&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-38473&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server proxy encoding problem&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38473&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-24795&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server: HTTP Response Splitting in multiple modules&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-24795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;                &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=expat-2.5.0-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28757&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45490&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8176&#34;,&#xA;                &#34;title&#34; : &#34;Libexpat: expat: improper restriction of xml entity expansion depth in libexpat&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45492&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45492&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50602&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59375&#34;,&#xA;                &#34;title&#34; : &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59375&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41080&#34;,&#xA;                &#34;title&#34; : &#34;libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41080&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/apr@1.7.0-11.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=apr-1.7.0-11.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2022-24963&#34;,&#xA;                &#34;title&#34; : &#34;Apache Portable Runtime (APR): out-of-bound writes in the apr_encode family of functions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-24963&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2022-24963&#34;,&#xA;                &#34;title&#34; : &#34;Apache Portable Runtime (APR): out-of-bound writes in the apr_encode family of functions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-24963&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=2&amp;upstream=shadow-utils-4.9-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-4641&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4641&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56433&#34;,&#xA;                &#34;title&#34; : &#34;shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.6,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56433&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-4641&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4641&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-38474&#34;,&#xA;              &#34;title&#34; : &#34;Apache HTTP Server weakness with encoded question marks in backreferences&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-38474&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libpq-13.5-1.el9.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2025-1094&#34;,&#xA;              &#34;title&#34; : &#34;PostgreSQL quoting APIs miss neutralizing quoting syntax in text that fails encoding validation&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.1,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-1094&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-12818&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-12818&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2022-41862&#34;,&#xA;              &#34;title&#34; : &#34;In PostgreSQL, a modified, unauthenticated server can send an unterminated string during the establishment of Kerberos transport encryption. In certain conditions a server can cause a libpq client to over-read and report an error message containing uninitialized bytes.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 3.7,&#xA;              &#34;severity&#34; : &#34;LOW&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2022-41862&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=krb5-1.20.1-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39975&#34;,&#xA;                &#34;title&#34; : &#34;kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26462&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37370&#34;,&#xA;                &#34;title&#34; : &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37370&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-36054&#34;,&#xA;                &#34;title&#34; : &#34;lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-36054&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37371&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37371&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24528&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24528&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26458&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26461&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26461&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3576&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3576&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libpq@13.5-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libpq-13.5-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-1094&#34;,&#xA;                &#34;title&#34; : &#34;PostgreSQL quoting APIs miss neutralizing quoting syntax in text that fails encoding validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-1094&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12818&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12818&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-41862&#34;,&#xA;                &#34;title&#34; : &#34;In PostgreSQL, a modified, unauthenticated server can send an unterminated string during the establishment of Kerberos transport encryption. In certain conditions a server can cause a libpq client to over-read and report an error message containing uninitialized bytes.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-41862&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-1094&#34;,&#xA;                &#34;title&#34; : &#34;PostgreSQL quoting APIs miss neutralizing quoting syntax in text that fails encoding validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-1094&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=openldap-2.6.2-3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openldap@2.6.2-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=openldap-2.6.2-3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=gmp-6.2.0-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/sscg@3.0.0-7.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=sscg-3.0.0-7.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/krb5-devel@1.20.1-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=krb5-1.20.1-8.el9.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.0,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-39975&#34;,&#xA;              &#34;title&#34; : &#34;kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-39975&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-26462&#34;,&#xA;              &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-26462&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-37370&#34;,&#xA;              &#34;title&#34; : &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-37370&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-36054&#34;,&#xA;              &#34;title&#34; : &#34;lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-36054&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-37371&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-37371&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-24528&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-24528&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-26458&#34;,&#xA;              &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-26458&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-26461&#34;,&#xA;              &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-26461&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-3576&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-3576&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-40355&#34;,&#xA;              &#34;title&#34; : &#34;In MIT Kerberos 5 (aka krb5) before 1.22.3, there is a NULL pointer dereference if an application calls gss_accept_sec_context() on a system with a NegoEx mechanism registered in /etc/gss/mech. An unauthenticated remote attacker can trigger this, causing the process to terminate in parse_nego_message.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-40355&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-40356&#34;,&#xA;              &#34;title&#34; : &#34;In MIT Kerberos 5 (aka krb5) before 1.22.3, there is an integer underflow and resultant out-of-bounds read if an application calls gss_accept_sec_context() on a system with a NegoEx mechanism registered in /etc/gss/mech. An unauthenticated remote attacker can trigger this, possibly causing the process to terminate in parse_message.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-40356&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libkadm5@1.20.1-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=krb5-1.20.1-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39975&#34;,&#xA;                &#34;title&#34; : &#34;kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26462&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37370&#34;,&#xA;                &#34;title&#34; : &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37370&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-36054&#34;,&#xA;                &#34;title&#34; : &#34;lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-36054&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37371&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37371&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24528&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24528&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26458&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26461&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26461&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3576&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3576&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=krb5-1.20.1-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39975&#34;,&#xA;                &#34;title&#34; : &#34;kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26462&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37370&#34;,&#xA;                &#34;title&#34; : &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37370&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-36054&#34;,&#xA;                &#34;title&#34; : &#34;lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-36054&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37371&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37371&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24528&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24528&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26458&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26461&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26461&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3576&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3576&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=gmp-6.2.0-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-inotify@0.9.6-25.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-inotify-0.9.6-25.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-setuptools-53.0.0-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-47273&#34;,&#xA;                &#34;title&#34; : &#34;setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-47273&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-setuptools-53.0.0-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-47273&#34;,&#xA;                &#34;title&#34; : &#34;setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-47273&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5713&#34;,&#xA;                &#34;title&#34; : &#34;Out-of-bounds read/write during remote profiling and asyncio process introspection when connecting to malicious target&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5713&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13837&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13837&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4224&#34;,&#xA;                &#34;title&#34; : &#34;Stack overflow parsing XML with deeply nested DTD content models&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4224&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3644&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete control character validation in http.cookies&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3644&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12781&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12781&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3446&#34;,&#xA;                &#34;title&#34; : &#34;Base64 decoding stops at first padded quad by default&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15282&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15282&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1502&#34;,&#xA;                &#34;title&#34; : &#34;HTTP client proxy tunnel headers not validated for CR/LF&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1502&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2297&#34;,&#xA;                &#34;title&#34; : &#34;SourcelessFileLoader does not use io.open_code()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2297&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3479&#34;,&#xA;                &#34;title&#34; : &#34;pkgutil.get_data() does not enforce documented restrictions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3479&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13462&#34;,&#xA;                &#34;title&#34; : &#34;tarfile: Skip DIRTYPE normalization during GNU LONGNAME/LONGLINK handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=sqlite-3.34.1-6.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-7104&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3277&#34;,&#xA;                &#34;title&#34; : &#34;An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3277&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=expat-2.5.0-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28757&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45490&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8176&#34;,&#xA;                &#34;title&#34; : &#34;Libexpat: expat: improper restriction of xml entity expansion depth in libexpat&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45492&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45492&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50602&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59375&#34;,&#xA;                &#34;title&#34; : &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59375&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41080&#34;,&#xA;                &#34;title&#34; : &#34;libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41080&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-pip-21.2.3-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2023-3899&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-3899&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libxml2-2.9.13-3.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49794&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: heap use after free (uaf) leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49794&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49796&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: type confusion leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56171&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56171&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24928&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24928&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7425&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: libxml2: heap use-after-free in libxslt caused by atype corruption in xmlattrptr&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-25062&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-25062&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32415&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32415&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49795&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: null pointer dereference leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6021&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6021&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7424&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: type confusion in xmlnode.psvi between stylesheet and source nodes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7424&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39615&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39615&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6732&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via crafted xsd-validated document&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6732&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9714&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9714&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1757&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: memory leak leading to local denial of service in xmllint interactive shell&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-49043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-49043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28484&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28484&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-29469&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the &#39;\\0&#39; value).&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0990&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via uncontrolled recursion in xml catalog processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32414&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32414&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-26434&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2, there is a possible out of bounds read due to a buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-26434&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0989&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: unbounded relaxng include recursion leading to stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0992&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via crafted xml catalogs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.9,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0992&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6170&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: stack buffer overflow in xmllint interactive shell command handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6170&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=krb5-1.20.1-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39975&#34;,&#xA;                &#34;title&#34; : &#34;kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26462&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37370&#34;,&#xA;                &#34;title&#34; : &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37370&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-36054&#34;,&#xA;                &#34;title&#34; : &#34;lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-36054&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37371&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37371&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24528&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24528&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26458&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26461&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26461&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3576&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3576&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-setuptools-53.0.0-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-47273&#34;,&#xA;                &#34;title&#34; : &#34;setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-47273&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5713&#34;,&#xA;                &#34;title&#34; : &#34;Out-of-bounds read/write during remote profiling and asyncio process introspection when connecting to malicious target&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5713&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13837&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13837&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4224&#34;,&#xA;                &#34;title&#34; : &#34;Stack overflow parsing XML with deeply nested DTD content models&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4224&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3644&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete control character validation in http.cookies&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3644&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12781&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12781&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3446&#34;,&#xA;                &#34;title&#34; : &#34;Base64 decoding stops at first padded quad by default&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15282&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15282&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1502&#34;,&#xA;                &#34;title&#34; : &#34;HTTP client proxy tunnel headers not validated for CR/LF&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1502&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2297&#34;,&#xA;                &#34;title&#34; : &#34;SourcelessFileLoader does not use io.open_code()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2297&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3479&#34;,&#xA;                &#34;title&#34; : &#34;pkgutil.get_data() does not enforce documented restrictions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3479&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13462&#34;,&#xA;                &#34;title&#34; : &#34;tarfile: Skip DIRTYPE normalization during GNU LONGNAME/LONGLINK handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcomps@0.1.18-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcomps-0.1.18-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-1312&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1312&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0980&#34;,&#xA;                &#34;title&#34; : &#34;Rubyipmi: red hat satellite: remote code execution in rubyipmi via malicious bmc username&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0980&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1207&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1207&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1530&#34;,&#xA;                &#34;title&#34; : &#34;Fog-kubevirt: fog-kubevirt: man-in-the-middle vulnerability due to disabled certificate validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1530&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1531&#34;,&#xA;                &#34;title&#34; : &#34;Foreman-kubevirt: foreman_kubevirt: man-in-the-middle due to insecure default ssl verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1531&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1961&#34;,&#xA;                &#34;title&#34; : &#34;Forman: foreman: remote code execution via command injection in websocket proxy&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-46877&#34;,&#xA;                &#34;title&#34; : &#34;jackson-databind 2.10.x through 2.12.x before 2.12.6 and 2.13.x before 2.13.1 allows attackers to cause a denial of service (2 GB transient heap usage per read) in uncommon situations involving JsonNode JDK serialization.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-46877&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14550&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14550&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6176&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1285&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1285&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68121&#34;,&#xA;                &#34;title&#34; : &#34;Unexpected session resumption in crypto/tls&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68121&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28863&#34;,&#xA;                &#34;title&#34; : &#34;node-tar vulnerable to denial of service while parsing a tar file due to lack of folders count validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28863&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4324&#34;,&#xA;                &#34;title&#34; : &#34;Rubygem-katello: katello: denial of service and potential information disclosure via sql injection&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4324&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-1312&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1312&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-libcomps@0.1.18-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcomps-0.1.18-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-1312&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1312&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0980&#34;,&#xA;                &#34;title&#34; : &#34;Rubyipmi: red hat satellite: remote code execution in rubyipmi via malicious bmc username&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0980&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1207&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1207&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1530&#34;,&#xA;                &#34;title&#34; : &#34;Fog-kubevirt: fog-kubevirt: man-in-the-middle vulnerability due to disabled certificate validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1530&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1531&#34;,&#xA;                &#34;title&#34; : &#34;Foreman-kubevirt: foreman_kubevirt: man-in-the-middle due to insecure default ssl verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1531&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1961&#34;,&#xA;                &#34;title&#34; : &#34;Forman: foreman: remote code execution via command injection in websocket proxy&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-46877&#34;,&#xA;                &#34;title&#34; : &#34;jackson-databind 2.10.x through 2.12.x before 2.12.6 and 2.13.x before 2.13.1 allows attackers to cause a denial of service (2 GB transient heap usage per read) in uncommon situations involving JsonNode JDK serialization.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-46877&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14550&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14550&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6176&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1285&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1285&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68121&#34;,&#xA;                &#34;title&#34; : &#34;Unexpected session resumption in crypto/tls&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68121&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28863&#34;,&#xA;                &#34;title&#34; : &#34;node-tar vulnerable to denial of service while parsing a tar file due to lack of folders count validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28863&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4324&#34;,&#xA;                &#34;title&#34; : &#34;Rubygem-katello: katello: denial of service and potential information disclosure via sql injection&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4324&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-1312&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1312&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gnupg2-2.3.3-2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-24882&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-24882&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68973&#34;,&#xA;                &#34;title&#34; : &#34;In GnuPG before 2.4.9, armor_filter in g10/armor.c has two increments of an index variable where one is intended, leading to an out-of-bounds write for crafted input. (For ExtendedLTS, 2.2.51 and later are fixed versions.)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68973&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68972&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68972&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-24882&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-24882&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=curl-7.76.1-23.el9_2.1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2398&#34;,&#xA;                &#34;title&#34; : &#34;HTTP/2 push headers memory-leak&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2398&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27536&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists libcurl &lt;8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27536&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28321&#34;,&#xA;                &#34;title&#34; : &#34;An improper certificate validation vulnerability exists in curl &lt;v8.1.0 in the way it supports matching of wildcard patterns when listed as \&#34;Subject Alternative Name\&#34; in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28321&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27538&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27538&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-46218&#34;,&#xA;                &#34;title&#34; : &#34;This flaw allows a malicious HTTP server to set \&#34;super cookies\&#34; in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl&#39;s function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-46218&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9086&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9086&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27533&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability in input validation exists in curl &lt;8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \&#34;telnet options\&#34; during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application&#39;s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27534&#34;,&#xA;                &#34;title&#34; : &#34;A path traversal vulnerability exists in curl &lt;8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27534&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28322&#34;,&#xA;                &#34;title&#34; : &#34;An information disclosure vulnerability exists in curl &lt;v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28322&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38546&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38546&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=curl-7.76.1-23.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2398&#34;,&#xA;                &#34;title&#34; : &#34;HTTP/2 push headers memory-leak&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2398&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27535&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl &lt;8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27536&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists libcurl &lt;8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27536&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28321&#34;,&#xA;                &#34;title&#34; : &#34;An improper certificate validation vulnerability exists in curl &lt;v8.1.0 in the way it supports matching of wildcard patterns when listed as \&#34;Subject Alternative Name\&#34; in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28321&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27538&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27538&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-46218&#34;,&#xA;                &#34;title&#34; : &#34;This flaw allows a malicious HTTP server to set \&#34;super cookies\&#34; in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl&#39;s function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-46218&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9086&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9086&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27533&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability in input validation exists in curl &lt;8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \&#34;telnet options\&#34; during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application&#39;s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27534&#34;,&#xA;                &#34;title&#34; : &#34;A path traversal vulnerability exists in curl &lt;8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27534&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28322&#34;,&#xA;                &#34;title&#34; : &#34;An information disclosure vulnerability exists in curl &lt;v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28322&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38546&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38546&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libarchive-3.5.3-4.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-5914&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5914&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4111&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: infinite loop denial of service in rar5 decompression via archive_read_data() in libarchive&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4111&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4424&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: libarchive: information disclosure via heap out-of-bounds read in rar archive processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4424&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5121&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: libarchive: arbitrary code execution via integer overflow in iso9660 image processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5121&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-60753&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-60753&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-57970&#34;,&#xA;                &#34;title&#34; : &#34;libarchive through 3.7.7 has a heap-based buffer over-read in header_gnu_longlink in archive_read_support_format_tar.c via a TAR archive because it mishandles truncation in the middle of a GNU long linkname.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-57970&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-25724&#34;,&#xA;                &#34;title&#34; : &#34;list_item_verbose in tar/util.c in libarchive through 3.7.7 does not check an strftime return value, which can lead to a denial of service or unspecified other impact via a crafted TAR archive that is read with a verbose value of 2. For example, the 100-byte buffer may not be sufficient for a custom locale.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-25724&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-5914&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5914&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glib2-2.68.4-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13601&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in in g_escape_uri_string()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-52533&#34;,&#xA;                &#34;title&#34; : &#34;gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing &#39;\\0&#39; character.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-52533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32611&#34;,&#xA;                &#34;title&#34; : &#34;G_variant_byteswap() can take a long time with some non-normal inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32611&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32665&#34;,&#xA;                &#34;title&#34; : &#34;Gvariant deserialisation does not match spec for non-normal data&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32665&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14512&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in glib gio attribute escaping causes heap buffer overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14512&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-29499&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29499&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14087&#34;,&#xA;                &#34;title&#34; : &#34;Glib: glib: buffer underflow in gvariant parser leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14087&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4373&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4373&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-34397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.8,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-34397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7039&#34;,&#xA;                &#34;title&#34; : &#34;Glib: buffer under-read on glib through glib/gfileutils.c via get_tmp_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7039&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0988&#34;,&#xA;                &#34;title&#34; : &#34;Glib: glib: denial of service via integer overflow in g_buffered_input_stream_peek()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0988&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13601&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in in g_escape_uri_string()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=sqlite-3.34.1-6.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-7104&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3277&#34;,&#xA;                &#34;title&#34; : &#34;An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3277&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=expat-2.5.0-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28757&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45490&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8176&#34;,&#xA;                &#34;title&#34; : &#34;Libexpat: expat: improper restriction of xml entity expansion depth in libexpat&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45492&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45492&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50602&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59375&#34;,&#xA;                &#34;title&#34; : &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59375&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41080&#34;,&#xA;                &#34;title&#34; : &#34;libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41080&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=nghttp2-1.43.0-5.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27135&#34;,&#xA;                &#34;title&#34; : &#34;nghttp2 Denial of service: Assertion failure due to the missing state validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27135&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28182&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28182&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gnutls-3.7.6-20.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-0553&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: incomplete fix for cve-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0553&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0567&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0567&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32988&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls othername san export&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32988&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32990&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls certtool template parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6395&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: null pointer dereference in _gnutls_figure_common_ciphersuite()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5981&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12243&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: gnutls impacted by inefficient der decoding in libtasn1 leading to remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12243&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28834&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28834&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14831&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: gnutls: denial of service via excessive resource consumption during certificate verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14831&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32989&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls sct extension parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28835&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28835&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9820&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: stack-based buffer overflow in gnutls_pkcs11_token_init() function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9820&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-0553&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: incomplete fix for cve-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0553&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libgcrypt-1.10.0-10.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2236&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2236&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41990&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 mishandles Dilithium signing. Writes to a static array lack a bounds check but do not use attacker-controlled data.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=openldap-2.6.2-3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openldap@2.6.2-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=openldap-2.6.2-3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/rpm-sign-libs@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/rpm-build-libs@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-rpm@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/rpm@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/tpm2-tss@3.0.3-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=tpm2-tss-3.0.3-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-22745&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-22745&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-22745&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-22745&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=gmp-6.2.0-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libsmartcols@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27456&#34;,&#xA;                &#34;title&#34; : &#34;util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27456&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3184&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: access control bypass due to improper hostname canonicalization&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3184&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgomp@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-pip-21.2.3-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/file-libs@5.39-12.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=file-5.39-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2022-48554&#34;,&#xA;                &#34;title&#34; : &#34;File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: \&#34;File\&#34; is the name of an Open Source project.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-48554&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2022-48554&#34;,&#xA;                &#34;title&#34; : &#34;File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: \&#34;File\&#34; is the name of an Open Source project.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-48554&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=2&amp;upstream=shadow-utils-4.9-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-4641&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4641&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56433&#34;,&#xA;                &#34;title&#34; : &#34;shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.6,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56433&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-4641&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4641&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/libcurl-devel@7.76.1-23.el9_2.1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=curl-7.76.1-23.el9_2.1.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;              &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.1,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-2398&#34;,&#xA;              &#34;title&#34; : &#34;HTTP/2 push headers memory-leak&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2398&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-27536&#34;,&#xA;              &#34;title&#34; : &#34;An authentication bypass vulnerability exists libcurl &lt;8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-27536&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-28321&#34;,&#xA;              &#34;title&#34; : &#34;An improper certificate validation vulnerability exists in curl &lt;v8.1.0 in the way it supports matching of wildcard patterns when listed as \&#34;Subject Alternative Name\&#34; in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-28321&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-27538&#34;,&#xA;              &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-27538&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-46218&#34;,&#xA;              &#34;title&#34; : &#34;This flaw allows a malicious HTTP server to set \&#34;super cookies\&#34; in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl&#39;s function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-46218&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-9086&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-9086&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-27533&#34;,&#xA;              &#34;title&#34; : &#34;A vulnerability in input validation exists in curl &lt;8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \&#34;telnet options\&#34; during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application&#39;s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 4.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-27533&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-27534&#34;,&#xA;              &#34;title&#34; : &#34;A path traversal vulnerability exists in curl &lt;8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 3.7,&#xA;              &#34;severity&#34; : &#34;LOW&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-27534&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-28322&#34;,&#xA;              &#34;title&#34; : &#34;An information disclosure vulnerability exists in curl &lt;v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 3.7,&#xA;              &#34;severity&#34; : &#34;LOW&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-28322&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-38546&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 3.7,&#xA;              &#34;severity&#34; : &#34;LOW&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-38546&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=krb5-1.20.1-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39975&#34;,&#xA;                &#34;title&#34; : &#34;kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26462&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37370&#34;,&#xA;                &#34;title&#34; : &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37370&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-36054&#34;,&#xA;                &#34;title&#34; : &#34;lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-36054&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37371&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37371&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24528&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24528&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26458&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26461&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26461&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3576&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3576&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=curl-7.76.1-23.el9_2.1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2398&#34;,&#xA;                &#34;title&#34; : &#34;HTTP/2 push headers memory-leak&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2398&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27536&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists libcurl &lt;8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27536&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28321&#34;,&#xA;                &#34;title&#34; : &#34;An improper certificate validation vulnerability exists in curl &lt;v8.1.0 in the way it supports matching of wildcard patterns when listed as \&#34;Subject Alternative Name\&#34; in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28321&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27538&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27538&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-46218&#34;,&#xA;                &#34;title&#34; : &#34;This flaw allows a malicious HTTP server to set \&#34;super cookies\&#34; in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl&#39;s function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-46218&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9086&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9086&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27533&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability in input validation exists in curl &lt;8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \&#34;telnet options\&#34; during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application&#39;s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27534&#34;,&#xA;                &#34;title&#34; : &#34;A path traversal vulnerability exists in curl &lt;8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27534&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28322&#34;,&#xA;                &#34;title&#34; : &#34;An information disclosure vulnerability exists in curl &lt;v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28322&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38546&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38546&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=nghttp2-1.43.0-5.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27135&#34;,&#xA;                &#34;title&#34; : &#34;nghttp2 Denial of service: Assertion failure due to the missing state validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27135&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28182&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28182&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=gmp-6.2.0-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2023-3899&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-3899&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5363&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28390&#34;,&#xA;                &#34;title&#34; : &#34;Possible NULL Dereference When Processing CMS KeyTransportRecipientInfo&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28390&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12797&#34;,&#xA;                &#34;title&#34; : &#34;RFC7250 handshakes with unauthenticated servers don&#39;t abort as expected&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69419&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69419&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2650&#34;,&#xA;                &#34;title&#34; : &#34;Possible DoS translating ASN.1 object identifiers&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2650&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6129&#34;,&#xA;                &#34;title&#34; : &#34;POLY1305 MAC implementation corrupts vector registers on PowerPC&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6129&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69421&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69421&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11187&#34;,&#xA;                &#34;title&#34; : &#34;Improper validation of PBMAC1 parameters in PKCS#12 MAC verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11187&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0464&#34;,&#xA;                &#34;title&#34; : &#34;Excessive Resource Usage Verifying X.509 Policy Constraints&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0464&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6237&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking invalid RSA public keys&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6237&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5535&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6119&#34;,&#xA;                &#34;title&#34; : &#34;Possible denial of service in X.509 name checks&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6119&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66199&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66199&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69420&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69420&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9231&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9231&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22796&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28388&#34;,&#xA;                &#34;title&#34; : &#34;NULL Pointer Dereference When Processing a Delta CRL&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28388&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28389&#34;,&#xA;                &#34;title&#34; : &#34;Possible NULL Dereference When Processing CMS KeyAgreeRecipientInfo&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28389&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-31790&#34;,&#xA;                &#34;title&#34; : &#34;Incorrect Failure Handling in RSA KEM RSASVE Encapsulation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-31790&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-31789&#34;,&#xA;                &#34;title&#34; : &#34;Heap Buffer Overflow in Hexadecimal Conversion&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-31789&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4741&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4741&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9230&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0727&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15469&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22795&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0465&#34;,&#xA;                &#34;title&#34; : &#34;Invalid certificate policies in leaf certificates are silently ignored&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0465&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0466&#34;,&#xA;                &#34;title&#34; : &#34;Certificate policy check not enabled&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0466&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2975&#34;,&#xA;                &#34;title&#34; : &#34;AES-SIV implementation ignores empty associated data entries&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3446&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3817&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DH q parameter value&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3817&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5678&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5678&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4603&#34;,&#xA;                &#34;title&#34; : &#34;Excessive time spent checking DSA keys and parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-1255&#34;,&#xA;                &#34;title&#34; : &#34;Input buffer over-read in AES-XTS implementation on 64 bit ARM&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-1255&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68160&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68160&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28386&#34;,&#xA;                &#34;title&#34; : &#34;Out-of-bounds Read in AES-CFB-128 on X86-64 with AVX-512 Support&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28386&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69418&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69418&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2511&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2511&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-28387&#34;,&#xA;                &#34;title&#34; : &#34;Potential Use-after-free in DANE Client Code&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-28387&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.1,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2673&#34;,&#xA;                &#34;title&#34; : &#34;OpenSSL TLS 1.3 server may choose unexpected key agreement group&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.1,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2673&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.8,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libxml2-2.9.13-3.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49794&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: heap use after free (uaf) leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49794&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49796&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: type confusion leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56171&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56171&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24928&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24928&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7425&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: libxml2: heap use-after-free in libxslt caused by atype corruption in xmlattrptr&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-25062&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-25062&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32415&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32415&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49795&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: null pointer dereference leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6021&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6021&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7424&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: type confusion in xmlnode.psvi between stylesheet and source nodes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7424&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39615&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39615&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6732&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via crafted xsd-validated document&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6732&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9714&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9714&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1757&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: memory leak leading to local denial of service in xmllint interactive shell&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-49043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-49043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28484&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28484&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-29469&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the &#39;\\0&#39; value).&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0990&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via uncontrolled recursion in xml catalog processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32414&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32414&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-26434&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2, there is a possible out of bounds read due to a buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-26434&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0989&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: unbounded relaxng include recursion leading to stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0992&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via crafted xml catalogs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.9,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0992&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6170&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: stack buffer overflow in xmllint interactive shell command handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6170&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=krb5-1.20.1-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39975&#34;,&#xA;                &#34;title&#34; : &#34;kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39975&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26462&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37370&#34;,&#xA;                &#34;title&#34; : &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37370&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-36054&#34;,&#xA;                &#34;title&#34; : &#34;lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-36054&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-37371&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-37371&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24528&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24528&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26458&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-26461&#34;,&#xA;                &#34;title&#34; : &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-26461&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3576&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3576&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-3596&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.0,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-3596&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-setuptools-53.0.0-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-47273&#34;,&#xA;                &#34;title&#34; : &#34;setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-47273&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-setuptools-53.0.0-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-47273&#34;,&#xA;                &#34;title&#34; : &#34;setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-47273&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5713&#34;,&#xA;                &#34;title&#34; : &#34;Out-of-bounds read/write during remote profiling and asyncio process introspection when connecting to malicious target&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5713&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13837&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13837&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4224&#34;,&#xA;                &#34;title&#34; : &#34;Stack overflow parsing XML with deeply nested DTD content models&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4224&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3644&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete control character validation in http.cookies&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3644&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12781&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12781&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3446&#34;,&#xA;                &#34;title&#34; : &#34;Base64 decoding stops at first padded quad by default&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3446&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15282&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15282&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11468&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11468&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1502&#34;,&#xA;                &#34;title&#34; : &#34;HTTP client proxy tunnel headers not validated for CR/LF&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1502&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-2297&#34;,&#xA;                &#34;title&#34; : &#34;SourcelessFileLoader does not use io.open_code()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2297&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3479&#34;,&#xA;                &#34;title&#34; : &#34;pkgutil.get_data() does not enforce documented restrictions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3479&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13462&#34;,&#xA;                &#34;title&#34; : &#34;tarfile: Skip DIRTYPE normalization during GNU LONGNAME/LONGLINK handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13462&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6100&#34;,&#xA;                &#34;title&#34; : &#34;Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6597&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6597&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12718&#34;,&#xA;                &#34;title&#34; : &#34;Bypass extraction filter to modify file metadata outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12718&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4517&#34;,&#xA;                &#34;title&#34; : &#34;Arbitrary writes via tarfile realpath overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4517&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-24329&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-24329&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6232&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6232&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-12084&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-12084&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4138&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4435&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile extracts filtered members when errorlevel=0&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8194&#34;,&#xA;                &#34;title&#34; : &#34;Tarfile infinite loop during parsing with negative member offset&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8194&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4330&#34;,&#xA;                &#34;title&#34; : &#34;Extraction filter bypass for linking outside extraction directory&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4330&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15366&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15366&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15367&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15367&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1299&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1299&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4519&#34;,&#xA;                &#34;title&#34; : &#34;webbrowser.open() allows leading dashes in URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4519&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4786&#34;,&#xA;                &#34;title&#34; : &#34;Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-6923&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-6923&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0938&#34;,&#xA;                &#34;title&#34; : &#34;URL parser allowed square brackets in domain names&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-13836&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13836&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-9287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-9287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0450&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0450&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8088&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8088&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7592&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7592&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6069&#34;,&#xA;                &#34;title&#34; : &#34;HTMLParser quadratic complexity when processing malformed inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6069&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8291&#34;,&#xA;                &#34;title&#34; : &#34;ZIP64 End of Central Directory (EOCD) Locator record offset not checked&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8291&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6075&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6075&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-11168&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-11168&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-4032&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-4032&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-5642&#34;,&#xA;                &#34;title&#34; : &#34;Buffer overread when using an empty list with SSLContext.set_npn_protocols()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-5642&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-40217&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40217&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcomps@0.1.18-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcomps-0.1.18-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-1312&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1312&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0980&#34;,&#xA;                &#34;title&#34; : &#34;Rubyipmi: red hat satellite: remote code execution in rubyipmi via malicious bmc username&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0980&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1207&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1207&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1530&#34;,&#xA;                &#34;title&#34; : &#34;Fog-kubevirt: fog-kubevirt: man-in-the-middle vulnerability due to disabled certificate validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1530&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1531&#34;,&#xA;                &#34;title&#34; : &#34;Foreman-kubevirt: foreman_kubevirt: man-in-the-middle due to insecure default ssl verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1531&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1961&#34;,&#xA;                &#34;title&#34; : &#34;Forman: foreman: remote code execution via command injection in websocket proxy&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-46877&#34;,&#xA;                &#34;title&#34; : &#34;jackson-databind 2.10.x through 2.12.x before 2.12.6 and 2.13.x before 2.13.1 allows attackers to cause a denial of service (2 GB transient heap usage per read) in uncommon situations involving JsonNode JDK serialization.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-46877&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14550&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14550&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6176&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1285&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1285&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68121&#34;,&#xA;                &#34;title&#34; : &#34;Unexpected session resumption in crypto/tls&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68121&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28863&#34;,&#xA;                &#34;title&#34; : &#34;node-tar vulnerable to denial of service while parsing a tar file due to lack of folders count validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28863&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4324&#34;,&#xA;                &#34;title&#34; : &#34;Rubygem-katello: katello: denial of service and potential information disclosure via sql injection&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4324&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-1312&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1312&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-libcomps@0.1.18-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcomps-0.1.18-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-1312&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1312&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0980&#34;,&#xA;                &#34;title&#34; : &#34;Rubyipmi: red hat satellite: remote code execution in rubyipmi via malicious bmc username&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0980&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1207&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1207&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1287&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1287&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1530&#34;,&#xA;                &#34;title&#34; : &#34;Fog-kubevirt: fog-kubevirt: man-in-the-middle vulnerability due to disabled certificate validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1530&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1531&#34;,&#xA;                &#34;title&#34; : &#34;Foreman-kubevirt: foreman_kubevirt: man-in-the-middle due to insecure default ssl verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1531&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1961&#34;,&#xA;                &#34;title&#34; : &#34;Forman: foreman: remote code execution via command injection in websocket proxy&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-46877&#34;,&#xA;                &#34;title&#34; : &#34;jackson-databind 2.10.x through 2.12.x before 2.12.6 and 2.13.x before 2.13.1 allows attackers to cause a denial of service (2 GB transient heap usage per read) in uncommon situations involving JsonNode JDK serialization.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-46877&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14550&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14550&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6176&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1285&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1285&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68121&#34;,&#xA;                &#34;title&#34; : &#34;Unexpected session resumption in crypto/tls&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68121&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28863&#34;,&#xA;                &#34;title&#34; : &#34;node-tar vulnerable to denial of service while parsing a tar file due to lack of folders count validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28863&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4324&#34;,&#xA;                &#34;title&#34; : &#34;Rubygem-katello: katello: denial of service and potential information disclosure via sql injection&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4324&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-1312&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1312&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gnupg2-2.3.3-2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-24882&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-24882&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68973&#34;,&#xA;                &#34;title&#34; : &#34;In GnuPG before 2.4.9, armor_filter in g10/armor.c has two increments of an index variable where one is intended, leading to an out-of-bounds write for crafted input. (For ExtendedLTS, 2.2.51 and later are fixed versions.)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68973&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-68972&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-68972&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-24882&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-24882&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=curl-7.76.1-23.el9_2.1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2398&#34;,&#xA;                &#34;title&#34; : &#34;HTTP/2 push headers memory-leak&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2398&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27536&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists libcurl &lt;8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27536&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28321&#34;,&#xA;                &#34;title&#34; : &#34;An improper certificate validation vulnerability exists in curl &lt;v8.1.0 in the way it supports matching of wildcard patterns when listed as \&#34;Subject Alternative Name\&#34; in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28321&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27538&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27538&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-46218&#34;,&#xA;                &#34;title&#34; : &#34;This flaw allows a malicious HTTP server to set \&#34;super cookies\&#34; in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl&#39;s function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-46218&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9086&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9086&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27533&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability in input validation exists in curl &lt;8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \&#34;telnet options\&#34; during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application&#39;s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27534&#34;,&#xA;                &#34;title&#34; : &#34;A path traversal vulnerability exists in curl &lt;8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27534&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28322&#34;,&#xA;                &#34;title&#34; : &#34;An information disclosure vulnerability exists in curl &lt;v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28322&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38546&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38546&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=curl-7.76.1-23.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2398&#34;,&#xA;                &#34;title&#34; : &#34;HTTP/2 push headers memory-leak&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2398&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27535&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl &lt;8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27535&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27536&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists libcurl &lt;8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27536&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28321&#34;,&#xA;                &#34;title&#34; : &#34;An improper certificate validation vulnerability exists in curl &lt;v8.1.0 in the way it supports matching of wildcard patterns when listed as \&#34;Subject Alternative Name\&#34; in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28321&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27538&#34;,&#xA;                &#34;title&#34; : &#34;An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27538&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-46218&#34;,&#xA;                &#34;title&#34; : &#34;This flaw allows a malicious HTTP server to set \&#34;super cookies\&#34; in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl&#39;s function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-46218&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9086&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9086&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27533&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability in input validation exists in curl &lt;8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \&#34;telnet options\&#34; during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application&#39;s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-27534&#34;,&#xA;                &#34;title&#34; : &#34;A path traversal vulnerability exists in curl &lt;8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-27534&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28322&#34;,&#xA;                &#34;title&#34; : &#34;An information disclosure vulnerability exists in curl &lt;v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28322&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-38546&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38546&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-38545&#34;,&#xA;                &#34;title&#34; : &#34;This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \&#34;let the host resolve the name\&#34; could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-38545&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/pam@1.5.1-14.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=pam-1.5.1-14.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6020&#34;,&#xA;                &#34;title&#34; : &#34;Linux-pam: linux-pam directory traversal&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6020&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8941&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8941&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-10963&#34;,&#xA;                &#34;title&#34; : &#34;Pam: improper hostname interpretation in pam_access leads to access control bypass&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.4,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-10963&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-22365&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-22365&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-10041&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-10041&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6020&#34;,&#xA;                &#34;title&#34; : &#34;Linux-pam: linux-pam directory traversal&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6020&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/systemd@252-13.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=systemd-252-13.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-29111&#34;,&#xA;                &#34;title&#34; : &#34;systemd: Local unprivileged user can trigger an assert&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-29111&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-40224&#34;,&#xA;                &#34;title&#34; : &#34;In systemd 259 before 260, there is local privilege escalation in systemd-machined because varlink can be used to reach the root namespace.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-40224&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4105&#34;,&#xA;                &#34;title&#34; : &#34;Systemd: systemd: privilege escalation via improper access control in registermachine d-bus method&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4105&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-40225&#34;,&#xA;                &#34;title&#34; : &#34;In udev in systemd before 260, local root execution can occur via malicious hardware devices and unsanitized kernel output.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-40225&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-40226&#34;,&#xA;                &#34;title&#34; : &#34;In nspawn in systemd 233 through 259 before 260, an escape-to-host action can occur via a crafted optional config file.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-40226&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-40227&#34;,&#xA;                &#34;title&#34; : &#34;In systemd 260 before 261, a local unprivileged user can trigger an assert via an IPC API call with an array or map that has a null element.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-40227&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4598&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4598&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-40223&#34;,&#xA;                &#34;title&#34; : &#34;In systemd 258 before 260, a local unprivileged user can trigger an assert when a Delegate=yes and User=&lt;unset&gt; unit exists and is running.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-40223&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-40228&#34;,&#xA;                &#34;title&#34; : &#34;In systemd 259, systemd-journald can send ANSI escape sequences to the terminals of arbitrary users when a \&#34;logger -p emerg\&#34; command is executed, if ForwardToWall=yes is set.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.9,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-40228&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-29111&#34;,&#xA;                &#34;title&#34; : &#34;systemd: Local unprivileged user can trigger an assert&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-29111&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-3899&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3899&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-3899&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3899&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-cloud-what@1.29.33.1-1.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-3899&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3899&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-3899&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3899&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libarchive-3.5.3-4.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-5914&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5914&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4111&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: infinite loop denial of service in rar5 decompression via archive_read_data() in libarchive&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4111&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4424&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: libarchive: information disclosure via heap out-of-bounds read in rar archive processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4424&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5121&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: libarchive: arbitrary code execution via integer overflow in iso9660 image processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5121&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-60753&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-60753&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-57970&#34;,&#xA;                &#34;title&#34; : &#34;libarchive through 3.7.7 has a heap-based buffer over-read in header_gnu_longlink in archive_read_support_format_tar.c via a TAR archive because it mishandles truncation in the middle of a GNU long linkname.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-57970&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-25724&#34;,&#xA;                &#34;title&#34; : &#34;list_item_verbose in tar/util.c in libarchive through 3.7.7 does not check an strftime return value, which can lead to a denial of service or unspecified other impact via a crafted TAR archive that is read with a verbose value of 2. For example, the 100-byte buffer may not be sufficient for a custom locale.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-25724&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-5914&#34;,&#xA;                &#34;title&#34; : &#34;Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5914&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-3899&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3899&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-3899&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3899&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glib2-2.68.4-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13601&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in in g_escape_uri_string()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-52533&#34;,&#xA;                &#34;title&#34; : &#34;gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing &#39;\\0&#39; character.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-52533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32611&#34;,&#xA;                &#34;title&#34; : &#34;G_variant_byteswap() can take a long time with some non-normal inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32611&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32665&#34;,&#xA;                &#34;title&#34; : &#34;Gvariant deserialisation does not match spec for non-normal data&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32665&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14512&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in glib gio attribute escaping causes heap buffer overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14512&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-29499&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29499&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14087&#34;,&#xA;                &#34;title&#34; : &#34;Glib: glib: buffer underflow in gvariant parser leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14087&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4373&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4373&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-34397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.8,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-34397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7039&#34;,&#xA;                &#34;title&#34; : &#34;Glib: buffer under-read on glib through glib/gfileutils.c via get_tmp_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7039&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0988&#34;,&#xA;                &#34;title&#34; : &#34;Glib: glib: denial of service via integer overflow in g_buffered_input_stream_peek()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0988&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13601&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in in g_escape_uri_string()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=sqlite-3.34.1-6.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-7104&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3277&#34;,&#xA;                &#34;title&#34; : &#34;An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3277&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=expat-2.5.0-1.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28757&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45490&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45490&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-8176&#34;,&#xA;                &#34;title&#34; : &#34;Libexpat: expat: improper restriction of xml entity expansion depth in libexpat&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-45492&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-45492&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-50602&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-50602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-59375&#34;,&#xA;                &#34;title&#34; : &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-59375&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41080&#34;,&#xA;                &#34;title&#34; : &#34;libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41080&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-52425&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=nghttp2-1.43.0-5.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27135&#34;,&#xA;                &#34;title&#34; : &#34;nghttp2 Denial of service: Assertion failure due to the missing state validation&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27135&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28182&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28182&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-44487&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-44487&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gnutls-3.7.6-20.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-0553&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: incomplete fix for cve-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0553&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0567&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0567&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32988&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls othername san export&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32988&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32990&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls certtool template parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6395&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: null pointer dereference in _gnutls_figure_common_ciphersuite()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5981&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12243&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: gnutls impacted by inefficient der decoding in libtasn1 leading to remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12243&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28834&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28834&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14831&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: gnutls: denial of service via excessive resource consumption during certificate verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14831&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32989&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls sct extension parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28835&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28835&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9820&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: stack-based buffer overflow in gnutls_pkcs11_token_init() function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9820&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-0553&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: incomplete fix for cve-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0553&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libgcrypt-1.10.0-10.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-2236&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2236&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-41990&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 mishandles Dilithium signing. Writes to a static array lack a bounds check but do not use attacker-controlled data.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-41989&#34;,&#xA;                &#34;title&#34; : &#34;Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-41989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=openldap-2.6.2-3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/openldap@2.6.2-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=openldap-2.6.2-3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2953&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2953&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/dmidecode@3.3-7.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=dmidecode-3.3-7.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-30630&#34;,&#xA;                &#34;title&#34; : &#34;Dmidecode before 3.5 allows -dump-bin to overwrite a local file. This has security relevance because, for example, execution of Dmidecode via Sudo is plausible. NOTE: Some third parties have indicated the fix in 3.5 does not adequately address the vulnerability. The argument is that the proposed patch prevents dmidecode from writing to an existing file. However, there are multiple attack vectors that would not require overwriting an existing file that would provide the same level of unauthorized privilege escalation (e.g. creating a new file in /etc/cron.hourly).&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-30630&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-30630&#34;,&#xA;                &#34;title&#34; : &#34;Dmidecode before 3.5 allows -dump-bin to overwrite a local file. This has security relevance because, for example, execution of Dmidecode via Sudo is plausible. NOTE: Some third parties have indicated the fix in 3.5 does not adequately address the vulnerability. The argument is that the proposed patch prevents dmidecode from writing to an existing file. However, there are multiple attack vectors that would not require overwriting an existing file that would provide the same level of unauthorized privilege escalation (e.g. creating a new file in /etc/cron.hourly).&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-30630&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libeconf@0.4.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libeconf-0.4.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-22652&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in \&#34;read_file\&#34; function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-22652&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-22652&#34;,&#xA;                &#34;title&#34; : &#34;Stack buffer overflow in \&#34;read_file\&#34; function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-22652&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/rpm-sign-libs@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/rpm-build-libs@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-rpm@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/rpm@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35939&#34;,&#xA;                &#34;title&#34; : &#34;It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35939&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2021-35937&#34;,&#xA;                &#34;title&#34; : &#34;A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35937&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-35938&#34;,&#xA;                &#34;title&#34; : &#34;A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-35938&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-decorator@4.4.2-6.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-decorator-4.4.2-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2727&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing policies imposed by the ImagePolicyWebhook admission plugin&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2728&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing enforce mountable secrets policy imposed by the ServiceAccount admission plugin&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2728&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2727&#34;,&#xA;                &#34;title&#34; : &#34;Bypassing policies imposed by the ImagePolicyWebhook admission plugin&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2727&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/tpm2-tss@3.0.3-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=tpm2-tss-3.0.3-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-22745&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-22745&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-22745&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-22745&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/dbus-libs@1.12.20-7.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=dbus-1.12.20-7.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-34969&#34;,&#xA;                &#34;title&#34; : &#34;D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-34969&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-34969&#34;,&#xA;                &#34;title&#34; : &#34;D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-34969&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/dbus-common@1.12.20-7.el9_1?arch=noarch&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=dbus-1.12.20-7.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-34969&#34;,&#xA;                &#34;title&#34; : &#34;D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-34969&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-34969&#34;,&#xA;                &#34;title&#34; : &#34;D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-34969&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=gmp-6.2.0-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-43618&#34;,&#xA;                &#34;title&#34; : &#34;GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-43618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=dbus-1.12.20-7.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-34969&#34;,&#xA;                &#34;title&#34; : &#34;D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-34969&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-34969&#34;,&#xA;                &#34;title&#34; : &#34;D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-34969&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libsmartcols@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/util-linux@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27456&#34;,&#xA;                &#34;title&#34; : &#34;util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27456&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3184&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: access control bypass due to improper hostname canonicalization&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3184&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-requests@2.25.1-6.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-requests-2.25.1-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-32681&#34;,&#xA;                &#34;title&#34; : &#34;Unintended leak of Proxy-Authorization header in requests&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32681&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-35195&#34;,&#xA;                &#34;title&#34; : &#34;Requests `Session` object does not verify requests after making first request with verify=False&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-35195&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-47081&#34;,&#xA;                &#34;title&#34; : &#34;Requests vulnerable to .netrc credentials leak via malicious URLs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-47081&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-32681&#34;,&#xA;                &#34;title&#34; : &#34;Unintended leak of Proxy-Authorization header in requests&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32681&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/util-linux-core@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27456&#34;,&#xA;                &#34;title&#34; : &#34;util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27456&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3184&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: access control bypass due to improper hostname canonicalization&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3184&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libfdisk@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgomp@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/systemd-pam@252-13.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=systemd-252-13.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4598&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4598&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/systemd-rpm-macros@252-13.el9_2?arch=noarch&amp;distro=rhel-9.2&amp;upstream=systemd-252-13.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4598&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4598&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/systemd-libs@252-13.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=systemd-252-13.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4598&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4598&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-7008&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7008&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-pip-21.2.3-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2007-4559&#34;,&#xA;                &#34;title&#34; : &#34;Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2007-4559&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/file-libs@5.39-12.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=file-5.39-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2022-48554&#34;,&#xA;                &#34;title&#34; : &#34;File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: \&#34;File\&#34; is the name of an Open Source project.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-48554&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2022-48554&#34;,&#xA;                &#34;title&#34; : &#34;File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: \&#34;File\&#34; is the name of an Open Source project.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-48554&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=2&amp;upstream=shadow-utils-4.9-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-4641&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4641&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56433&#34;,&#xA;                &#34;title&#34; : &#34;shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.6,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56433&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-4641&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4641&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2025-15467&#34;,&#xA;              &#34;title&#34; : &#34;Stack buffer overflow in CMS (Auth)EnvelopedData parsing&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.8,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-15467&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gd-2.3.2-3.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libwebp@1.2.0-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libwebp-1.2.0-6.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-4863&#34;,&#xA;                &#34;title&#34; : &#34;Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.6,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4863&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-4863&#34;,&#xA;                &#34;title&#34; : &#34;Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.6,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4863&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libxml2-2.9.13-3.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49794&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: heap use after free (uaf) leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49794&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49796&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: type confusion leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56171&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56171&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24928&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24928&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7425&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: libxml2: heap use-after-free in libxslt caused by atype corruption in xmlattrptr&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-25062&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-25062&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32415&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32415&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49795&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: null pointer dereference leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6021&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6021&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7424&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: type confusion in xmlnode.psvi between stylesheet and source nodes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7424&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39615&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39615&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6732&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via crafted xsd-validated document&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6732&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9714&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9714&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1757&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: memory leak leading to local denial of service in xmllint interactive shell&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-49043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-49043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28484&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28484&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-29469&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the &#39;\\0&#39; value).&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0990&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via uncontrolled recursion in xml catalog processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32414&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32414&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-26434&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2, there is a possible out of bounds read due to a buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-26434&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0989&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: unbounded relaxng include recursion leading to stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0992&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via crafted xml catalogs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.9,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0992&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6170&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: stack buffer overflow in xmllint interactive shell command handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6170&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/graphite2@1.3.14-9.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=graphite2-1.3.14-9.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2017-5436&#34;,&#xA;                &#34;title&#34; : &#34;An out-of-bounds write in the Graphite 2 library triggered with a maliciously crafted Graphite font. This results in a potentially exploitable crash. This issue was fixed in the Graphite 2 library as well as Mozilla products. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2017-5436&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2017-5436&#34;,&#xA;                &#34;title&#34; : &#34;An out-of-bounds write in the Graphite 2 library triggered with a maliciously crafted Graphite font. This results in a potentially exploitable crash. This issue was fixed in the Graphite 2 library as well as Mozilla products. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2017-5436&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtiff@4.4.0-7.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtiff-4.4.0-7.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-9900&#34;,&#xA;                &#34;title&#34; : &#34;Libtiff: libtiff write-what-where&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8176&#34;,&#xA;                &#34;title&#34; : &#34;LibTIFF tiffmedian.c get_histogram use after free&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4775&#34;,&#xA;                &#34;title&#34; : &#34;Libtiff: libtiff: arbitrary code execution or denial of service via signed integer overflow in tiff file processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4775&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2017-17095&#34;,&#xA;                &#34;title&#34; : &#34;tools/pal2rgb.c in pal2rgb in LibTIFF 4.0.9 allows remote attackers to cause a denial of service (TIFFSetupStrips heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2017-17095&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-52355&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52355&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-52356&#34;,&#xA;                &#34;title&#34; : &#34;Libtiff: segment fault in libtiff  in tiffreadrgbatileext() leading to denial of service&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-52356&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-7006&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-7006&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-40090&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in function TIFFReadDirectory libtiff before 4.4.0 allows attackers to cause a denial of service via crafted TIFF file.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-40090&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3618&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3618&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-40745&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40745&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-41175&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-41175&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0795&#34;,&#xA;                &#34;title&#34; : &#34;LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3488, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0796&#34;,&#xA;                &#34;title&#34; : &#34;LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3592, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0797&#34;,&#xA;                &#34;title&#34; : &#34;LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in libtiff/tif_unix.c:368, invoked by tools/tiffcrop.c:2903 and tools/tiffcrop.c:6921, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0797&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0798&#34;,&#xA;                &#34;title&#34; : &#34;LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3400, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0798&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0800&#34;,&#xA;                &#34;title&#34; : &#34;LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3502, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0800&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0801&#34;,&#xA;                &#34;title&#34; : &#34;LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in libtiff/tif_unix.c:368, invoked by tools/tiffcrop.c:2903 and tools/tiffcrop.c:6778, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0801&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0802&#34;,&#xA;                &#34;title&#34; : &#34;LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3724, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0803&#34;,&#xA;                &#34;title&#34; : &#34;LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3516, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0803&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0804&#34;,&#xA;                &#34;title&#34; : &#34;LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3609, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0804&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-48281&#34;,&#xA;                &#34;title&#34; : &#34;processCropSelections in tools/tiffcrop.c in LibTIFF through 4.5.0 has a heap-based buffer overflow (e.g., \&#34;WRITE of size 307203\&#34;) via a crafted TIFF image.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-48281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-0799&#34;,&#xA;                &#34;title&#34; : &#34;LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3701, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-0799&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-26965&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-26965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-26966&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-26966&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2731&#34;,&#xA;                &#34;title&#34; : &#34;A NULL pointer dereference flaw was found in Libtiff&#39;s LZWDecode() function in the libtiff/tif_lzw.c file. This flaw allows a local attacker to craft specific input data that can cause the program to dereference a NULL pointer when decompressing a TIFF format file, resulting in a program crash or denial of service.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2731&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3316&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3316&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3576&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3576&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-61143&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-61143&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-61144&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-61144&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-61145&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-61145&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-6228&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-6228&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-9900&#34;,&#xA;                &#34;title&#34; : &#34;Libtiff: libtiff write-what-where&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/freetype@2.10.4-9.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=freetype-2.10.4-9.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-27363&#34;,&#xA;                &#34;title&#34; : &#34;An out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are not vulnerable) when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-27363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-23865&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-23865&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-27363&#34;,&#xA;                &#34;title&#34; : &#34;An out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are not vulnerable) when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-27363&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libX11-common@1.7.0-7.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=libX11-1.7.0-7.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-43787&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43787&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3138&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in libX11. The security flaw occurs because the functions in src/InitExt.c in libX11 do not check that the values provided for the Request, Event, or Error IDs are within the bounds of the arrays that those functions write to, using those IDs as array indexes. They trust that they were called with values provided by an Xserver adhering to the bounds specified in the X11 protocol, as all X servers provided by X.Org do. As the protocol only specifies a single byte for these values, an out-of-bounds value provided by a malicious server (or a malicious proxy-in-the-middle) can only overwrite other portions of the Display structure and not write outside the bounds of the Display structure itself, possibly causing the client to crash with this memory corruption.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-43785&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43785&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-43786&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-43787&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43787&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libX11@1.7.0-7.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libX11-1.7.0-7.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-43787&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43787&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3138&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in libX11. The security flaw occurs because the functions in src/InitExt.c in libX11 do not check that the values provided for the Request, Event, or Error IDs are within the bounds of the arrays that those functions write to, using those IDs as array indexes. They trust that they were called with values provided by an Xserver adhering to the bounds specified in the X11 protocol, as all X servers provided by X.Org do. As the protocol only specifies a single byte for these values, an out-of-bounds value provided by a malicious server (or a malicious proxy-in-the-middle) can only overwrite other portions of the Display structure and not write outside the bounds of the Display structure itself, possibly causing the client to crash with this memory corruption.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-43785&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43785&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-43786&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-43787&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43787&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glib2-2.68.4-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13601&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in in g_escape_uri_string()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-52533&#34;,&#xA;                &#34;title&#34; : &#34;gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing &#39;\\0&#39; character.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-52533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32611&#34;,&#xA;                &#34;title&#34; : &#34;G_variant_byteswap() can take a long time with some non-normal inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32611&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32665&#34;,&#xA;                &#34;title&#34; : &#34;Gvariant deserialisation does not match spec for non-normal data&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32665&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14512&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in glib gio attribute escaping causes heap buffer overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14512&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-29499&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29499&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14087&#34;,&#xA;                &#34;title&#34; : &#34;Glib: glib: buffer underflow in gvariant parser leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14087&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4373&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4373&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-34397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.8,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-34397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7039&#34;,&#xA;                &#34;title&#34; : &#34;Glib: buffer under-read on glib through glib/gfileutils.c via get_tmp_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7039&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0988&#34;,&#xA;                &#34;title&#34; : &#34;Glib: glib: denial of service via integer overflow in g_buffered_input_stream_peek()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0988&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13601&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in in g_escape_uri_string()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libpng@1.6.37-12.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=2&amp;upstream=libpng-1.6.37-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-33636&#34;,&#xA;                &#34;title&#34; : &#34;LIBPNG has ARM NEON Palette Expansion Out-of-Bounds Read on AArch64&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-33636&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-33416&#34;,&#xA;                &#34;title&#34; : &#34;LIBPNG has use-after-free via pointer aliasing in `png_set_tRNS` and `png_set_PLTE`&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-33416&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-64720&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-64720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-65018&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-65018&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-66293&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-66293&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-25646&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-25646&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22801&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22801&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-28162&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-28162&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-64506&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-64506&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22695&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22695&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3713&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3713&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-28164&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-28164&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-64505&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-64505&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-33636&#34;,&#xA;                &#34;title&#34; : &#34;LIBPNG has ARM NEON Palette Expansion Out-of-Bounds Read on AArch64&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-33636&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gnutls-3.7.6-20.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-0553&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: incomplete fix for cve-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0553&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0567&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0567&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32988&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls othername san export&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32988&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32990&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls certtool template parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6395&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: null pointer dereference in _gnutls_figure_common_ciphersuite()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5981&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12243&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: gnutls impacted by inefficient der decoding in libtasn1 leading to remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12243&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28834&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28834&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14831&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: gnutls: denial of service via excessive resource consumption during certificate verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14831&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32989&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls sct extension parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28835&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28835&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9820&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: stack-based buffer overflow in gnutls_pkcs11_token_init() function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9820&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-0553&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: incomplete fix for cve-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0553&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libbrotli@1.0.9-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=brotli-1.0.9-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6176&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6176&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6176&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/harfbuzz@2.7.4-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=harfbuzz-2.7.4-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-25193&#34;,&#xA;                &#34;title&#34; : &#34;hb-ot-layout-gsubgpos.hh in HarfBuzz through 6.0.0 allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-25193&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-22693&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-22693&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-25193&#34;,&#xA;                &#34;title&#34; : &#34;hb-ot-layout-gsubgpos.hh in HarfBuzz through 6.0.0 allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-25193&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libjpeg-turbo@2.0.90-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libjpeg-turbo-2.0.90-6.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2021-29390&#34;,&#xA;                &#34;title&#34; : &#34;libjpeg-turbo version 2.0.90 has a heap-based buffer over-read (2 bytes) in decompress_smooth_data in jdcoefct.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-29390&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2021-29390&#34;,&#xA;                &#34;title&#34; : &#34;libjpeg-turbo version 2.0.90 has a heap-based buffer over-read (2 bytes) in decompress_smooth_data in jdcoefct.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2021-29390&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27456&#34;,&#xA;                &#34;title&#34; : &#34;util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27456&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3184&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: access control bypass due to improper hostname canonicalization&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3184&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libXpm@3.5.13-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libXpm-3.5.13-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-43788&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43788&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-43789&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43789&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-43788&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43788&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2023-4863&#34;,&#xA;              &#34;title&#34; : &#34;Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.6,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-4863&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libxslt-1.1.34-9.el9.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2024-55549&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-55549&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-24855&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-24855&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-7425&#34;,&#xA;              &#34;title&#34; : &#34;Libxslt: libxml2: heap use-after-free in libxslt caused by atype corruption in xmlattrptr&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-7425&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-7424&#34;,&#xA;              &#34;title&#34; : &#34;Libxslt: type confusion in xmlnode.psvi between stylesheet and source nodes&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-7424&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-40403&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-40403&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libxml2-2.9.13-3.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49794&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: heap use after free (uaf) leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49794&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49796&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: type confusion leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56171&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56171&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24928&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24928&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7425&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: libxml2: heap use-after-free in libxslt caused by atype corruption in xmlattrptr&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-25062&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-25062&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32415&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32415&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49795&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: null pointer dereference leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6021&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6021&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7424&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: type confusion in xmlnode.psvi between stylesheet and source nodes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7424&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39615&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39615&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6732&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via crafted xsd-validated document&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6732&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9714&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9714&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1757&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: memory leak leading to local denial of service in xmllint interactive shell&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-49043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-49043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28484&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28484&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-29469&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the &#39;\\0&#39; value).&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0990&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via uncontrolled recursion in xml catalog processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32414&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32414&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-26434&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2, there is a possible out of bounds read due to a buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-26434&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0989&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: unbounded relaxng include recursion leading to stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0992&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via crafted xml catalogs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.9,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0992&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6170&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: stack buffer overflow in xmllint interactive shell command handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6170&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libxml2-2.9.13-3.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49794&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: heap use after free (uaf) leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49794&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49796&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: type confusion leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56171&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56171&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24928&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24928&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7425&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: libxml2: heap use-after-free in libxslt caused by atype corruption in xmlattrptr&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-25062&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-25062&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32415&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32415&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49795&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: null pointer dereference leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6021&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6021&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7424&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: type confusion in xmlnode.psvi between stylesheet and source nodes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7424&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39615&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39615&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9714&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9714&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-49043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-49043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28484&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28484&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-29469&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the &#39;\\0&#39; value).&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32414&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32414&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libxslt@1.1.34-9.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libxslt-1.1.34-9.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-55549&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-55549&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24855&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24855&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7425&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: libxml2: heap use-after-free in libxslt caused by atype corruption in xmlattrptr&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7424&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: type confusion in xmlnode.psvi between stylesheet and source nodes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7424&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-40403&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-40403&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-10911&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: use-after-free with key data stored cross-rvt&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-10911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-11731&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: type confusion in exsltfuncresultcompfunction of libxslt&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.1,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-11731&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-55549&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-55549&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-devel@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;              &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.1,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;                &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-31486&#34;,&#xA;                &#34;title&#34; : &#34;HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31486&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-31486&#34;,&#xA;                &#34;title&#34; : &#34;HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31486&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-POSIX@1.94-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Symbol@1.08-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-mro@1.23-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-SelectSaver@1.02-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Getopt-Std@1.12-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Class-Struct@0.66-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-subs@1.03-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-vars@1.05-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-interpreter@5.32.1-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=4&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-overload@1.31-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-libs@5.32.1-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=4&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-if@0.60.800-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-File-stat@1.09-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Fcntl@1.13-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-IO@1.43-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-File-Basename@2.85-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-IPC-Open3@1.21-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-overloading@0.02-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Errno@1.30-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=perl-constant-1.33-461.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Storable@3.21-460.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=perl-Storable-3.21-460.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2017-20230&#34;,&#xA;                &#34;title&#34; : &#34;Storable versions before 3.05 for Perl has a stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2017-20230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2017-20230&#34;,&#xA;                &#34;title&#34; : &#34;Storable versions before 3.05 for Perl has a stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2017-20230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2023-37920&#34;,&#xA;              &#34;title&#34; : &#34;Certifi&#39;s removal of e-Tugra root certificate&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.1,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-37920&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/xml-common@0.6.3-58.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=sgml-common-0.6.3-58.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libxml2-2.9.13-3.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49794&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: heap use after free (uaf) leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49794&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49796&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: type confusion leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56171&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56171&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24928&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24928&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7425&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: libxml2: heap use-after-free in libxslt caused by atype corruption in xmlattrptr&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-25062&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-25062&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32415&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32415&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49795&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: null pointer dereference leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6021&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6021&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7424&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: type confusion in xmlnode.psvi between stylesheet and source nodes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7424&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39615&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39615&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6732&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via crafted xsd-validated document&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6732&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9714&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9714&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1757&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: memory leak leading to local denial of service in xmllint interactive shell&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-49043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-49043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28484&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28484&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-29469&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the &#39;\\0&#39; value).&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0990&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via uncontrolled recursion in xml catalog processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32414&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32414&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-26434&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2, there is a possible out of bounds read due to a buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-26434&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0989&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: unbounded relaxng include recursion leading to stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0992&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via crafted xml catalogs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.9,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0992&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6170&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: stack buffer overflow in xmllint interactive shell command handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6170&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;              &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.1,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libxml2-2.9.13-3.el9_1.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;              &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.1,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-49794&#34;,&#xA;              &#34;title&#34; : &#34;Libxml: heap use after free (uaf) leads to denial of service (dos)&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.1,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-49794&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-49796&#34;,&#xA;              &#34;title&#34; : &#34;Libxml: type confusion leads to denial of service (dos)&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.1,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-49796&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-56171&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.1,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-56171&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-24928&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-24928&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-7425&#34;,&#xA;              &#34;title&#34; : &#34;Libxslt: libxml2: heap use-after-free in libxslt caused by atype corruption in xmlattrptr&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-7425&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-25062&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-25062&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-32415&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-32415&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-49795&#34;,&#xA;              &#34;title&#34; : &#34;Libxml: null pointer dereference leads to denial of service (dos)&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-49795&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-6021&#34;,&#xA;              &#34;title&#34; : &#34;Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-6021&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-7424&#34;,&#xA;              &#34;title&#34; : &#34;Libxslt: type confusion in xmlnode.psvi between stylesheet and source nodes&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-7424&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-39615&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-39615&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-9714&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.2,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-9714&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2022-49043&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2022-49043&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-28484&#34;,&#xA;              &#34;title&#34; : &#34;In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-28484&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-29469&#34;,&#xA;              &#34;title&#34; : &#34;An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the &#39;\\0&#39; value).&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-29469&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-32414&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.6,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-32414&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libxml2-2.9.13-3.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49794&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: heap use after free (uaf) leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49794&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49796&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: type confusion leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49796&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-56171&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56171&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-24928&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-24928&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7425&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: libxml2: heap use-after-free in libxslt caused by atype corruption in xmlattrptr&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7425&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-25062&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-25062&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32415&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32415&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-49795&#34;,&#xA;                &#34;title&#34; : &#34;Libxml: null pointer dereference leads to denial of service (dos)&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-49795&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6021&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6021&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7424&#34;,&#xA;                &#34;title&#34; : &#34;Libxslt: type confusion in xmlnode.psvi between stylesheet and source nodes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7424&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-39615&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-39615&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-6732&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via crafted xsd-validated document&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-6732&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9714&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9714&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-1757&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: memory leak leading to local denial of service in xmllint interactive shell&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-1757&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-49043&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-49043&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-28484&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-28484&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-29469&#34;,&#xA;                &#34;title&#34; : &#34;An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the &#39;\\0&#39; value).&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29469&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0990&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via uncontrolled recursion in xml catalog processing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32414&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32414&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-26434&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2, there is a possible out of bounds read due to a buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-26434&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0989&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: unbounded relaxng include recursion leading to stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0992&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: libxml2: denial of service via crafted xml catalogs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.9,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0992&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6170&#34;,&#xA;                &#34;title&#34; : &#34;Libxml2: stack buffer overflow in xmllint interactive shell command handling&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 2.5,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6170&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;                &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 9.1,&#xA;                &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-devel@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-40896&#34;,&#xA;              &#34;title&#34; : &#34;In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \&#34;checked\&#34;). This makes classic XXE attacks possible.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 9.1,&#xA;              &#34;severity&#34; : &#34;CRITICAL&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-40896&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/json-c@0.14-11.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=json-c-0.14-11.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/sqlite@3.34.1-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=sqlite-3.34.1-6.el9_1.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;              &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.7,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-7104&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.3,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-7104&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-3277&#34;,&#xA;              &#34;title&#34; : &#34;An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.3,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-3277&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-70873&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 3.3,&#xA;              &#34;severity&#34; : &#34;LOW&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-70873&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=sqlite-3.34.1-6.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-7104&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3277&#34;,&#xA;                &#34;title&#34; : &#34;An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3277&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/atlas-devel@3.10.3-17.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=atlas-3.10.3-17.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libquadmath@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgfortran@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/libicu-devel@67.1-9.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=icu-67.1-9.el9.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2025-5222&#34;,&#xA;              &#34;title&#34; : &#34;Icu: stack buffer overflow in the srbroot::addtag function&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.0,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-5222&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libicu@67.1-9.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=icu-67.1-9.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-5222&#34;,&#xA;                &#34;title&#34; : &#34;Icu: stack buffer overflow in the srbroot::addtag function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5222&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-5222&#34;,&#xA;                &#34;title&#34; : &#34;Icu: stack buffer overflow in the srbroot::addtag function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5222&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-locale-source@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;              &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.1,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;              &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.6,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.0,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;              &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.6,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;              &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;              &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 4.2,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;              &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 4.0,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;              &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 4.0,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-31486&#34;,&#xA;                &#34;title&#34; : &#34;HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31486&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-31486&#34;,&#xA;                &#34;title&#34; : &#34;HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31486&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-POSIX@1.94-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Symbol@1.08-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-mro@1.23-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-SelectSaver@1.02-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Getopt-Std@1.12-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Class-Struct@0.66-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-subs@1.03-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-vars@1.05-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-interpreter@5.32.1-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=4&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-overload@1.31-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-libs@5.32.1-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=4&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-if@0.60.800-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-File-stat@1.09-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Fcntl@1.13-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-IO@1.43-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-File-Basename@2.85-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-base@2.27-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-IPC-Open3@1.21-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Errno@1.30-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-overloading@0.02-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=perl-constant-1.33-461.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Storable@3.21-460.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=perl-Storable-3.21-460.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2017-20230&#34;,&#xA;                &#34;title&#34; : &#34;Storable versions before 3.05 for Perl has a stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2017-20230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2017-20230&#34;,&#xA;                &#34;title&#34; : &#34;Storable versions before 3.05 for Perl has a stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2017-20230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/hunspell-en-US@0.20140811.1-20.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=hunspell-en-0.20140811.1-20.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=2&amp;upstream=shadow-utils-4.9-6.el9.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2023-4641&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 4.7,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-4641&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-56433&#34;,&#xA;              &#34;title&#34; : &#34;shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 3.6,&#xA;              &#34;severity&#34; : &#34;LOW&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-56433&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/pcre-cpp@8.44-3.el9.3?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=pcre-8.44-3.el9.3.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=perl-Digest-1.19-4.el9.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.0,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;              &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-31486&#34;,&#xA;                &#34;title&#34; : &#34;HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31486&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-31486&#34;,&#xA;                &#34;title&#34; : &#34;HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31486&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-POSIX@1.94-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Symbol@1.08-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-mro@1.23-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-SelectSaver@1.02-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Getopt-Std@1.12-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Class-Struct@0.66-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-subs@1.03-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-vars@1.05-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-interpreter@5.32.1-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=4&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-overload@1.31-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-libs@5.32.1-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=4&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-if@0.60.800-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-File-stat@1.09-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Fcntl@1.13-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-IO@1.43-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-File-Basename@2.85-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-IPC-Open3@1.21-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Errno@1.30-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-overloading@0.02-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=perl-constant-1.33-461.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Storable@3.21-460.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=perl-Storable-3.21-460.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2017-20230&#34;,&#xA;                &#34;title&#34; : &#34;Storable versions before 3.05 for Perl has a stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2017-20230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2017-20230&#34;,&#xA;                &#34;title&#34; : &#34;Storable versions before 3.05 for Perl has a stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2017-20230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/apr-devel@1.7.0-11.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=apr-1.7.0-11.el9.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2022-24963&#34;,&#xA;              &#34;title&#34; : &#34;Apache Portable Runtime (APR): out-of-bound writes in the apr_encode family of functions&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2022-24963&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/apr@1.7.0-11.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=apr-1.7.0-11.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2022-24963&#34;,&#xA;                &#34;title&#34; : &#34;Apache Portable Runtime (APR): out-of-bound writes in the apr_encode family of functions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-24963&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2022-24963&#34;,&#xA;                &#34;title&#34; : &#34;Apache Portable Runtime (APR): out-of-bound writes in the apr_encode family of functions&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-24963&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B-devel@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;              &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.1,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/xz@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;              &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-34743&#34;,&#xA;              &#34;title&#34; : &#34;XZ Utils: Buffer overflow in lzma_index_append()&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-34743&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/nss_wrapper-libs@1.1.13-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=nss_wrapper-1.1.13-1.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;              &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.3,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.0,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;              &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-31486&#34;,&#xA;                &#34;title&#34; : &#34;HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31486&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-31486&#34;,&#xA;                &#34;title&#34; : &#34;HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31486&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-POSIX@1.94-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Symbol@1.08-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-mro@1.23-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-SelectSaver@1.02-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Getopt-Std@1.12-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Class-Struct@0.66-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-subs@1.03-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-vars@1.05-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-interpreter@5.32.1-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=4&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-overload@1.31-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-libs@5.32.1-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=4&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-if@0.60.800-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-File-stat@1.09-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Fcntl@1.13-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-IO@1.43-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-File-Basename@2.85-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-IPC-Open3@1.21-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Errno@1.30-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-overloading@0.02-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=perl-constant-1.33-461.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Storable@3.21-460.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=perl-Storable-3.21-460.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2017-20230&#34;,&#xA;                &#34;title&#34; : &#34;Storable versions before 3.05 for Perl has a stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2017-20230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2017-20230&#34;,&#xA;                &#34;title&#34; : &#34;Storable versions before 3.05 for Perl has a stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2017-20230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=automake-1.16.2-6.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/emacs-filesystem@27.2-8.el9_2.1?arch=noarch&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=emacs-27.2-8.el9_2.1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-1244&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-1244&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-30205&#34;,&#xA;                &#34;title&#34; : &#34;In Emacs before 29.3, Org mode considers contents of remote files to be trusted. This affects Org Mode before 9.6.23.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-30205&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-39331&#34;,&#xA;                &#34;title&#34; : &#34;In Emacs before 29.4, org-link-expand-abbrev in lisp/ol.el expands a %(...) link abbrev even when it specifies an unsafe function, such as shell-command-to-string. This affects Org Mode before 9.7.5.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-39331&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-53920&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-53920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-30203&#34;,&#xA;                &#34;title&#34; : &#34;In Emacs before 29.3, Gnus treats inline MIME contents as trusted.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-30203&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-30204&#34;,&#xA;                &#34;title&#34; : &#34;In Emacs before 29.3, LaTeX preview is enabled by default for e-mail attachments.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-30204&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-1244&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-1244&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-31486&#34;,&#xA;                &#34;title&#34; : &#34;HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31486&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-31486&#34;,&#xA;                &#34;title&#34; : &#34;HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31486&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-POSIX@1.94-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Symbol@1.08-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-mro@1.23-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-SelectSaver@1.02-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Getopt-Std@1.12-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Class-Struct@0.66-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-subs@1.03-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-File-Compare@1.100.600-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-vars@1.05-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-interpreter@5.32.1-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=4&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-overload@1.31-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-libs@5.32.1-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=4&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-B@1.80-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-if@0.60.800-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-File-stat@1.09-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Fcntl@1.13-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-IO@1.43-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-File-Find@1.37-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-File-Basename@2.85-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-DynaLoader@1.47-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-IPC-Open3@1.21-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Errno@1.30-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-overloading@0.02-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=perl-constant-1.33-461.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Storable@3.21-460.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=perl-Storable-3.21-460.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2017-20230&#34;,&#xA;                &#34;title&#34; : &#34;Storable versions before 3.05 for Perl has a stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2017-20230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2017-20230&#34;,&#xA;                &#34;title&#34; : &#34;Storable versions before 3.05 for Perl has a stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2017-20230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/libdb-devel@5.3.28-53.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libdb-5.3.28-53.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/file@5.39-12.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=file-5.39-12.el9.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2022-48554&#34;,&#xA;              &#34;title&#34; : &#34;File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: \&#34;File\&#34; is the name of an Open Source project.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2022-48554&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/file-libs@5.39-12.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=file-5.39-12.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2022-48554&#34;,&#xA;                &#34;title&#34; : &#34;File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: \&#34;File\&#34; is the name of an Open Source project.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-48554&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2022-48554&#34;,&#xA;                &#34;title&#34; : &#34;File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: \&#34;File\&#34; is the name of an Open Source project.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-48554&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/libverto-devel@0.3.2-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libverto-0.3.2-3.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/patch@2.7.6-16.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=patch-2.7.6-16.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-headers@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;              &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.6,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.0,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;              &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.6,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;              &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;              &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 4.2,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;              &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 4.0,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;              &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 4.0,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/wget@1.21.1-7.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=wget-1.21.1-7.el9.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2024-38428&#34;,&#xA;              &#34;title&#34; : &#34;url.c in GNU Wget through 1.24.5 mishandles semicolons in the userinfo subcomponent of a URI, and thus there may be insecure behavior in which data that was supposed to be in the userinfo subcomponent is misinterpreted to be part of the host subcomponent.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-38428&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gnutls-3.7.6-20.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-0553&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: incomplete fix for cve-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0553&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0567&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0567&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32988&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls othername san export&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32988&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32990&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls certtool template parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6395&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: null pointer dereference in _gnutls_figure_common_ciphersuite()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5981&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12243&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: gnutls impacted by inefficient der decoding in libtasn1 leading to remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12243&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28834&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28834&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14831&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: gnutls: denial of service via excessive resource consumption during certificate verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14831&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32989&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls sct extension parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28835&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28835&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9820&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: stack-based buffer overflow in gnutls_pkcs11_token_init() function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9820&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-0553&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: incomplete fix for cve-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0553&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;              &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.3,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.0,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;              &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-31486&#34;,&#xA;                &#34;title&#34; : &#34;HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31486&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-31486&#34;,&#xA;                &#34;title&#34; : &#34;HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31486&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-POSIX@1.94-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Symbol@1.08-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-mro@1.23-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-SelectSaver@1.02-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Getopt-Std@1.12-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Class-Struct@0.66-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-subs@1.03-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-vars@1.05-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-interpreter@5.32.1-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=4&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-overload@1.31-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-libs@5.32.1-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=4&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-if@0.60.800-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-File-stat@1.09-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Fcntl@1.13-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-IO@1.43-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-File-Basename@2.85-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-IPC-Open3@1.21-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-overloading@0.02-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Errno@1.30-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=perl-constant-1.33-461.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Storable@3.21-460.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=perl-Storable-3.21-460.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2017-20230&#34;,&#xA;                &#34;title&#34; : &#34;Storable versions before 3.05 for Perl has a stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2017-20230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2017-20230&#34;,&#xA;                &#34;title&#34; : &#34;Storable versions before 3.05 for Perl has a stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2017-20230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;              &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 4.4,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/libgpg-error-devel@1.42-5.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libgpg-error-1.42-5.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/libpsl@0.21.1-5.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libpsl-0.21.1-5.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/libtool-ltdl@2.4.6-45.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtool-2.4.6-45.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;              &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.3,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.0,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;              &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-31486&#34;,&#xA;                &#34;title&#34; : &#34;HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31486&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-31486&#34;,&#xA;                &#34;title&#34; : &#34;HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31486&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-POSIX@1.94-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Symbol@1.08-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-mro@1.23-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-SelectSaver@1.02-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Getopt-Std@1.12-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Class-Struct@0.66-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-subs@1.03-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-vars@1.05-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-interpreter@5.32.1-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=4&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-overload@1.31-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-libs@5.32.1-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=4&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-if@0.60.800-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-File-stat@1.09-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Fcntl@1.13-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-IO@1.43-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-File-Basename@2.85-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-IPC-Open3@1.21-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Errno@1.30-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-overloading@0.02-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=perl-constant-1.33-461.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Storable@3.21-460.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=perl-Storable-3.21-460.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2017-20230&#34;,&#xA;                &#34;title&#34; : &#34;Storable versions before 3.05 for Perl has a stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2017-20230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2017-20230&#34;,&#xA;                &#34;title&#34; : &#34;Storable versions before 3.05 for Perl has a stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2017-20230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=perl-Thread-Queue-3.14-460.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-31486&#34;,&#xA;                &#34;title&#34; : &#34;HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31486&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-31486&#34;,&#xA;                &#34;title&#34; : &#34;HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31486&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-POSIX@1.94-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Symbol@1.08-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-mro@1.23-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-SelectSaver@1.02-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Getopt-Std@1.12-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Class-Struct@0.66-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-subs@1.03-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-vars@1.05-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-interpreter@5.32.1-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=4&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-overload@1.31-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-libs@5.32.1-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=4&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-if@0.60.800-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-File-stat@1.09-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Fcntl@1.13-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-IO@1.43-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-File-Basename@2.85-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-IPC-Open3@1.21-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Errno@1.30-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-overloading@0.02-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=perl-constant-1.33-461.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Storable@3.21-460.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=perl-Storable-3.21-460.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2017-20230&#34;,&#xA;                &#34;title&#34; : &#34;Storable versions before 3.05 for Perl has a stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2017-20230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2017-20230&#34;,&#xA;                &#34;title&#34; : &#34;Storable versions before 3.05 for Perl has a stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2017-20230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/gdb-gdbserver@10.2-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gdb-10.2-10.el9.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2021-3826&#34;,&#xA;              &#34;title&#34; : &#34;Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2021-3826&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/libipt@2.0.4-5.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libipt-2.0.4-5.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/libcom_err-devel@1.46.5-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=e2fsprogs-1.46.5-3.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/libxcrypt-compat@4.4.18-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libxcrypt-4.4.18-3.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/libpath_utils@0.2.1-53.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ding-libs-0.6.1-53.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/boost-regex@1.75.0-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=boost-1.75.0-8.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libicu@67.1-9.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=icu-67.1-9.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-5222&#34;,&#xA;                &#34;title&#34; : &#34;Icu: stack buffer overflow in the srbroot::addtag function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5222&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-5222&#34;,&#xA;                &#34;title&#34; : &#34;Icu: stack buffer overflow in the srbroot::addtag function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5222&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/xorg-x11-proto-devel@2021.4-2.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=xorg-x11-proto-devel-2021.4-2.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/libtalloc@2.3.4-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtalloc-2.3.4-1.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/m4@1.4.19-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=m4-1.4.19-1.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libXpm-3.5.13-8.el9_1.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2023-43788&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-43788&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-43789&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-43789&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libX11-devel@1.7.0-7.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libX11-1.7.0-7.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-43787&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43787&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3138&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in libX11. The security flaw occurs because the functions in src/InitExt.c in libX11 do not check that the values provided for the Request, Event, or Error IDs are within the bounds of the arrays that those functions write to, using those IDs as array indexes. They trust that they were called with values provided by an Xserver adhering to the bounds specified in the X11 protocol, as all X servers provided by X.Org do. As the protocol only specifies a single byte for these values, an out-of-bounds value provided by a malicious server (or a malicious proxy-in-the-middle) can only overwrite other portions of the Display structure and not write outside the bounds of the Display structure itself, possibly causing the client to crash with this memory corruption.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-43785&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43785&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-43786&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-43787&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43787&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libX11-xcb@1.7.0-7.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libX11-1.7.0-7.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-43787&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43787&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3138&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in libX11. The security flaw occurs because the functions in src/InitExt.c in libX11 do not check that the values provided for the Request, Event, or Error IDs are within the bounds of the arrays that those functions write to, using those IDs as array indexes. They trust that they were called with values provided by an Xserver adhering to the bounds specified in the X11 protocol, as all X servers provided by X.Org do. As the protocol only specifies a single byte for these values, an out-of-bounds value provided by a malicious server (or a malicious proxy-in-the-middle) can only overwrite other portions of the Display structure and not write outside the bounds of the Display structure itself, possibly causing the client to crash with this memory corruption.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-43785&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43785&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-43786&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-43787&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43787&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libX11-common@1.7.0-7.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=libX11-1.7.0-7.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-43787&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43787&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3138&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in libX11. The security flaw occurs because the functions in src/InitExt.c in libX11 do not check that the values provided for the Request, Event, or Error IDs are within the bounds of the arrays that those functions write to, using those IDs as array indexes. They trust that they were called with values provided by an Xserver adhering to the bounds specified in the X11 protocol, as all X servers provided by X.Org do. As the protocol only specifies a single byte for these values, an out-of-bounds value provided by a malicious server (or a malicious proxy-in-the-middle) can only overwrite other portions of the Display structure and not write outside the bounds of the Display structure itself, possibly causing the client to crash with this memory corruption.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-43785&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43785&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-43786&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-43787&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43787&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libX11@1.7.0-7.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libX11-1.7.0-7.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-43787&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43787&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-3138&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in libX11. The security flaw occurs because the functions in src/InitExt.c in libX11 do not check that the values provided for the Request, Event, or Error IDs are within the bounds of the arrays that those functions write to, using those IDs as array indexes. They trust that they were called with values provided by an Xserver adhering to the bounds specified in the X11 protocol, as all X servers provided by X.Org do. As the protocol only specifies a single byte for these values, an out-of-bounds value provided by a malicious server (or a malicious proxy-in-the-middle) can only overwrite other portions of the Display structure and not write outside the bounds of the Display structure itself, possibly causing the client to crash with this memory corruption.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-3138&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-43785&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43785&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-43786&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43786&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-43787&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43787&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libXpm@3.5.13-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libXpm-3.5.13-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-43788&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43788&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-43789&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43789&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-43788&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-43788&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/source-highlight@3.1.9-11.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=source-highlight-3.1.9-11.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libicu@67.1-9.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=icu-67.1-9.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-5222&#34;,&#xA;                &#34;title&#34; : &#34;Icu: stack buffer overflow in the srbroot::addtag function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5222&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-5222&#34;,&#xA;                &#34;title&#34; : &#34;Icu: stack buffer overflow in the srbroot::addtag function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5222&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/rootfiles@8.1-31.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=rootfiles-8.1-31.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/hostname@3.23-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=hostname-3.23-6.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/enchant@1.6.0-30.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=enchant-1.6.0-30.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glib2-2.68.4-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13601&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in in g_escape_uri_string()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-52533&#34;,&#xA;                &#34;title&#34; : &#34;gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing &#39;\\0&#39; character.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-52533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32611&#34;,&#xA;                &#34;title&#34; : &#34;G_variant_byteswap() can take a long time with some non-normal inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32611&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32665&#34;,&#xA;                &#34;title&#34; : &#34;Gvariant deserialisation does not match spec for non-normal data&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32665&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14512&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in glib gio attribute escaping causes heap buffer overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14512&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-29499&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29499&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14087&#34;,&#xA;                &#34;title&#34; : &#34;Glib: glib: buffer underflow in gvariant parser leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14087&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4373&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4373&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-34397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.8,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-34397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7039&#34;,&#xA;                &#34;title&#34; : &#34;Glib: buffer under-read on glib through glib/gfileutils.c via get_tmp_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7039&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0988&#34;,&#xA;                &#34;title&#34; : &#34;Glib: glib: denial of service via integer overflow in g_buffered_input_stream_peek()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0988&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13601&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in in g_escape_uri_string()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gnutls-3.7.6-20.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-0553&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: incomplete fix for cve-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0553&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0567&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0567&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32988&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls othername san export&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32988&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32990&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls certtool template parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6395&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: null pointer dereference in _gnutls_figure_common_ciphersuite()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5981&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12243&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: gnutls impacted by inefficient der decoding in libtasn1 leading to remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12243&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28834&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28834&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14831&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: gnutls: denial of service via excessive resource consumption during certificate verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14831&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32989&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls sct extension parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28835&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28835&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9820&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: stack-based buffer overflow in gnutls_pkcs11_token_init() function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9820&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-0553&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: incomplete fix for cve-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0553&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27456&#34;,&#xA;                &#34;title&#34; : &#34;util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27456&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3184&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: access control bypass due to improper hostname canonicalization&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3184&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/sqlite-devel@3.34.1-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=sqlite-3.34.1-6.el9_1.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;              &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.7,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-7104&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.3,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-7104&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-3277&#34;,&#xA;              &#34;title&#34; : &#34;An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.3,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-3277&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/sqlite@3.34.1-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=sqlite-3.34.1-6.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-7104&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3277&#34;,&#xA;                &#34;title&#34; : &#34;An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3277&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-70873&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-70873&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=sqlite-3.34.1-6.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-7104&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-7104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-3277&#34;,&#xA;                &#34;title&#34; : &#34;An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-3277&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-6965&#34;,&#xA;                &#34;title&#34; : &#34;Integer Truncation on SQLite&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6965&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/dmidecode@3.3-7.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=dmidecode-3.3-7.el9.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2023-30630&#34;,&#xA;              &#34;title&#34; : &#34;Dmidecode before 3.5 allows -dump-bin to overwrite a local file. This has security relevance because, for example, execution of Dmidecode via Sudo is plausible. NOTE: Some third parties have indicated the fix in 3.5 does not adequately address the vulnerability. The argument is that the proposed patch prevents dmidecode from writing to an existing file. However, there are multiple attack vectors that would not require overwriting an existing file that would provide the same level of unauthorized privilege escalation (e.g. creating a new file in /etc/cron.hourly).&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.1,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-30630&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=autoconf-2.69-38.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/emacs-filesystem@27.2-8.el9_2.1?arch=noarch&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=emacs-27.2-8.el9_2.1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-1244&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-1244&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-30205&#34;,&#xA;                &#34;title&#34; : &#34;In Emacs before 29.3, Org mode considers contents of remote files to be trusted. This affects Org Mode before 9.6.23.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-30205&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-39331&#34;,&#xA;                &#34;title&#34; : &#34;In Emacs before 29.4, org-link-expand-abbrev in lisp/ol.el expands a %(...) link abbrev even when it specifies an unsafe function, such as shell-command-to-string. This affects Org Mode before 9.7.5.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-39331&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-53920&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-53920&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-30203&#34;,&#xA;                &#34;title&#34; : &#34;In Emacs before 29.3, Gnus treats inline MIME contents as trusted.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-30203&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-30204&#34;,&#xA;                &#34;title&#34; : &#34;In Emacs before 29.3, LaTeX preview is enabled by default for e-mail attachments.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-30204&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-1244&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-1244&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-31486&#34;,&#xA;                &#34;title&#34; : &#34;HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31486&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-31486&#34;,&#xA;                &#34;title&#34; : &#34;HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31486&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-POSIX@1.94-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Symbol@1.08-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-mro@1.23-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-SelectSaver@1.02-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Getopt-Std@1.12-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Class-Struct@0.66-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-subs@1.03-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-File-Compare@1.100.600-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-vars@1.05-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-interpreter@5.32.1-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=4&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-overload@1.31-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-libs@5.32.1-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=4&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-B@1.80-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-if@0.60.800-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-File-stat@1.09-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Fcntl@1.13-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-IO@1.43-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-File-Find@1.37-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-File-Basename@2.85-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-DynaLoader@1.47-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-IPC-Open3@1.21-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Errno@1.30-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-overloading@0.02-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=perl-constant-1.33-461.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Storable@3.21-460.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=perl-Storable-3.21-460.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2017-20230&#34;,&#xA;                &#34;title&#34; : &#34;Storable versions before 3.05 for Perl has a stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2017-20230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2017-20230&#34;,&#xA;                &#34;title&#34; : &#34;Storable versions before 3.05 for Perl has a stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2017-20230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/keyutils-libs-devel@1.6.3-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=keyutils-1.6.3-1.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=babeltrace-1.5.8-10.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4878&#34;,&#xA;                &#34;title&#34; : &#34;Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4878&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-2602&#34;,&#xA;                &#34;title&#34; : &#34;A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.3,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-2603&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-2603&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glib2-2.68.4-6.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13601&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in in g_escape_uri_string()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-52533&#34;,&#xA;                &#34;title&#34; : &#34;gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing &#39;\\0&#39; character.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-52533&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32611&#34;,&#xA;                &#34;title&#34; : &#34;G_variant_byteswap() can take a long time with some non-normal inputs&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32611&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-32665&#34;,&#xA;                &#34;title&#34; : &#34;Gvariant deserialisation does not match spec for non-normal data&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-32665&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14512&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in glib gio attribute escaping causes heap buffer overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14512&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-29499&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29499&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14087&#34;,&#xA;                &#34;title&#34; : &#34;Glib: glib: buffer underflow in gvariant parser leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14087&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4373&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.8,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4373&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-34397&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.8,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-34397&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-7039&#34;,&#xA;                &#34;title&#34; : &#34;Glib: buffer under-read on glib through glib/gfileutils.c via get_tmp_file()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-7039&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0988&#34;,&#xA;                &#34;title&#34; : &#34;Glib: glib: denial of service via integer overflow in g_buffered_input_stream_peek()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0988&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13601&#34;,&#xA;                &#34;title&#34; : &#34;Glib: integer overflow in in g_escape_uri_string()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.7,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-31115&#34;,&#xA;                &#34;title&#34; : &#34;XZ has a heap-use-after-free bug in threaded .xz decoder&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-31115&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gnutls-3.7.6-20.el9_2.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-0553&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: incomplete fix for cve-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0553&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-0567&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0567&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32988&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls othername san export&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32988&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32990&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls certtool template parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32990&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-6395&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: null pointer dereference in _gnutls_figure_common_ciphersuite()&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-6395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5981&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12243&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: gnutls impacted by inefficient der decoding in libtasn1 leading to remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12243&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28834&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28834&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-14831&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: gnutls: denial of service via excessive resource consumption during certificate verification&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14831&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-32989&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: vulnerability in gnutls sct extension parsing&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-32989&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-28835&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-28835&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-9820&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: stack-based buffer overflow in gnutls_pkcs11_token_init() function&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-9820&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-0553&#34;,&#xA;                &#34;title&#34; : &#34;Gnutls: incomplete fix for cve-2023-5981&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.5,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-0553&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-27456&#34;,&#xA;                &#34;title&#34; : &#34;util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.7,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-27456&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3184&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: access control bypass due to improper hostname canonicalization&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 3.7,&#xA;                &#34;severity&#34; : &#34;LOW&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3184&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-14104&#34;,&#xA;                &#34;title&#34; : &#34;Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-14104&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-12133&#34;,&#xA;                &#34;title&#34; : &#34;Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-12133&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2025-13151&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-13151&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2026-2100&#34;,&#xA;                &#34;title&#34; : &#34;P11-kit: null dereference via c_derivekey with specific null parameters&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-2100&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2019-12900&#34;,&#xA;                &#34;title&#34; : &#34;BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.4,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2019-12900&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/hunspell-en-GB@0.20140811.1-20.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=hunspell-en-0.20140811.1-20.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/hunspell-en@0.20140811.1-20.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=hunspell-en-0.20140811.1-20.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=nss_wrapper-1.1.13-1.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-31486&#34;,&#xA;                &#34;title&#34; : &#34;HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31486&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-31486&#34;,&#xA;                &#34;title&#34; : &#34;HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-31486&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-POSIX@1.94-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Symbol@1.08-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-mro@1.23-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-SelectSaver@1.02-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Getopt-Std@1.12-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Class-Struct@0.66-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-subs@1.03-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-vars@1.05-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-interpreter@5.32.1-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=4&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-overload@1.31-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-libs@5.32.1-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=4&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-if@0.60.800-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-File-stat@1.09-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Fcntl@1.13-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-IO@1.43-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-File-Basename@2.85-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-IPC-Open3@1.21-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Errno@1.30-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-overloading@0.02-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-56406&#34;,&#xA;                &#34;title&#34; : &#34;Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.3,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-56406&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=perl-constant-1.33-461.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-40909&#34;,&#xA;                &#34;title&#34; : &#34;Perl threads have a working directory race condition where file operations may target unintended paths&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-40909&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-47038&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-47038&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/perl-Storable@3.21-460.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=perl-Storable-3.21-460.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2017-20230&#34;,&#xA;                &#34;title&#34; : &#34;Storable versions before 3.05 for Perl has a stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2017-20230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2017-20230&#34;,&#xA;                &#34;title&#34; : &#34;Storable versions before 3.05 for Perl has a stack overflow&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2017-20230&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/llvm-libs@15.0.7-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=llvm-15.0.7-1.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/tar@1.34-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=2&amp;upstream=tar-1.34-6.el9_1.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2025-45582&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.6,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-45582&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/annobin@11.05-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=annobin-11.05-1.el9.src.rpm&#34;,&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;&#xD;  0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--:--     0&#xD;  0 1884k    0     0    0     0      0      0 --:--:-- --:--:-- --:--:--     0&#xD;100 1884k    0     0  100 1884k      0   852k  0:00:02  0:00:02 --:--:--  852k&#xD;100 1899k    0 15645  100 1884k   6775   815k  0:00:02  0:00:02 --:--:--  822k&#xD;100 3768k    0 1884k  100 1884k   571k   571k  0:00:03  0:00:03 --:--:-- 1142k&#xD;100 10.5M    0 8914k  100 1884k  2243k   474k  0:00:03  0:00:03 --:--:-- 2717k&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-gconv-extra@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;              &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.1,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;              &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.6,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.0,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 6.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.9,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;              &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.6,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;              &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;              &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 4.2,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;              &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 4.0,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;              &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 4.0,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:rpm/redhat/vim-minimal@8.2.2637-20.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=2&amp;upstream=vim-8.2.2637-20.el9_1.src.rpm&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2026-34982&#34;,&#xA;              &#34;title&#34; : &#34;Vim modeline bypass via various options affects Vim &lt; 9.2.0276&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.2,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-34982&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-25749&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.3,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-25749&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-33412&#34;,&#xA;              &#34;title&#34; : &#34;Vim affected by Command injection via newline in glob()&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.3,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-33412&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2023-4752&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 7.0,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-4752&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2021-3903&#34;,&#xA;              &#34;title&#34; : &#34;Heap-based Buffer Overflow in vim/vim&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.5,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2021-3903&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-28421&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 5.3,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-28421&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2026-28417&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 4.4,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2026-28417&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-53905&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 4.1,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-53905&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2025-53906&#34;,&#xA;              &#34;title&#34; : &#34;Vim has path traversal issue with zip.vim and special crafted zip archives&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 4.1,&#xA;              &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2025-53906&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0861&#34;,&#xA;                &#34;title&#34; : &#34;Integer overflow in memalign leads to heap corruption&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.1,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0861&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4911&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4911&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33599&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Stack-based buffer overflow in netgroup cache&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.6,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33599&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-4802&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.0,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-4802&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4527&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4527&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4437&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4437&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4806&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4806&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2023-4813&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-4813&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-15281&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-15281&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-3904&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-3904&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-5435&#34;,&#xA;                &#34;title&#34; : &#34;Potential buffer overflow in ns_sprintrrf TSIG handling path&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.9,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-5435&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-5702&#34;,&#xA;                &#34;title&#34; : &#34;The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.6,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-5702&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-0395&#34;,&#xA;                &#34;title&#34; : &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-0395&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33600&#34;,&#xA;                &#34;title&#34; : &#34;nscd: Null pointer crashes after notfound response&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33600&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-0915&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 5.3,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-0915&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-8058&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.2,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-8058&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33601&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache may terminate daemon on memory allocation failure&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33601&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2024-33602&#34;,&#xA;                &#34;title&#34; : &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-33602&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2026-4438&#34;,&#xA;                &#34;title&#34; : &#34;gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 4.0,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2026-4438&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 8.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2025-69720&#34;,&#xA;                &#34;title&#34; : &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2025-69720&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }, {&#xA;                &#34;id&#34; : &#34;CVE-2022-29458&#34;,&#xA;                &#34;title&#34; : &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2022-29458&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-29491&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 7.8,&#xA;                &#34;severity&#34; : &#34;HIGH&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-29491&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            }, {&#xA;              &#34;ref&#34; : &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2020-11023&#34;,&#xA;                &#34;title&#34; : &#34;Potential XSS vulnerability in jQuery&#34;,&#xA;                &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;                &#34;cvssScore&#34; : 6.1,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2020-11023&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-2961&#34;,&#xA;              &#34;source&#34; : &#34;redhat-csaf&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-2961&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          } ]&#xA;        }&#xA;      }&#xA;    }&#xA;  },&#xA;  &#34;licenses&#34; : [ {&#xA;    &#34;status&#34; : {&#xA;      &#34;ok&#34; : true,&#xA;      &#34;name&#34; : &#34;deps.dev&#34;,&#xA;      &#34;code&#34; : 200,&#xA;      &#34;message&#34; : &#34;OK&#34;,&#xA;      &#34;warnings&#34; : { }&#xA;    },&#xA;    &#34;summary&#34; : {&#xA;      &#34;total&#34; : 109,&#xA;      &#34;concluded&#34; : 402,&#xA;      &#34;permissive&#34; : 103,&#xA;      &#34;weakCopyleft&#34; : 0,&#xA;      &#34;strongCopyleft&#34; : 1,&#xA;      &#34;unknown&#34; : 5,&#xA;      &#34;deprecated&#34; : 1,&#xA;      &#34;osiApproved&#34; : 104,&#xA;      &#34;fsfLibre&#34; : 105&#xA;    },&#xA;    &#34;packages&#34; : {&#xA;      &#34;pkg:rpm/redhat/hunspell-en-US@0.20140811.1-20.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=hunspell-en-0.20140811.1-20.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/hostname@3.23-6.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libffi-devel@3.4.2-7.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libffi-3.4.2-7.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/just-diff@5.1.1&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/langpacks-core-en@3.0-16.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=langpacks-3.0-16.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/delegates@1.0.0&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:npm/isexe@2.0.0&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:npm/tiny-relative-date@1.3.0&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libXpm@3.5.13-8.el9_1&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=cyrus-sasl-2.1.27-21.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/m4@1.4.19-1.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bzip2-1.0.8-8.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/crypto-policies-scripts@20221215-1.git9a18988.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=crypto-policies-20221215-1.git9a18988.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/read-cmd-shim@3.0.0&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libstdc%2B%2B-devel@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/util-deprecate@1.0.2&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libsemanage@3.5-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libsemanage-3.5-1.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/ed@1.14.2-12.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ed-1.14.2-12.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=openldap-2.6.2-3.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/qt5-srpm-macros@5.15.3-1.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=qt5-5.15.3-1.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/perl-File-Temp@0.231.100-4.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/graphite2-devel@1.3.14-9.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/pcre-utf32@8.44-3.el9.3&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:pypi/pysocks@1.7.1&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;non-standard&#34;,&#xA;            &#34;name&#34; : &#34;non-standard&#34;,&#xA;            &#34;category&#34; : &#34;UNKNOWN&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;non-standard&#34;,&#xA;          &#34;name&#34; : &#34;non-standard&#34;,&#xA;          &#34;category&#34; : &#34;UNKNOWN&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;non-standard&#34;,&#xA;            &#34;name&#34; : &#34;non-standard&#34;,&#xA;            &#34;category&#34; : &#34;UNKNOWN&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;non-standard&#34;,&#xA;          &#34;name&#34; : &#34;non-standard&#34;,&#xA;          &#34;category&#34; : &#34;UNKNOWN&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:pypi/blinker@1.9.0&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:pypi/rpm@4.16.1.3&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/fonts-filesystem@2.0.5-7.el9.1?arch=noarch&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=fonts-rpm-macros-2.0.5-7.el9.1.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/builtins@5.0.1&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/perl-Carp@1.50-460.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:pypi/libcomps@0.1.18&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=sqlite-3.34.1-6.el9_1.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gnutls-3.7.6-20.el9_2.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/perl-File-stat@1.09-480.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/perl-IO@1.43-480.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/jbigkit-libs@2.1-23.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=jbigkit-2.1-23.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/%40npmcli/query@1.2.0&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/crypto-policies@20221215-1.git9a18988.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=crypto-policies-20221215-1.git9a18988.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/harfbuzz-icu@2.7.4-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=harfbuzz-2.7.4-8.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/python3-idna@2.10-7.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-idna-2.10-7.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/pcre-devel@8.44-3.el9.3?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=pcre-8.44-3.el9.3.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/lua-libs@5.4.4-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=lua-5.4.4-3.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/cyrus-sasl-lib@2.1.27-21.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=cyrus-sasl-2.1.27-21.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:pypi/markupsafe@3.0.3&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;BSD-3-Clause&#34;,&#xA;            &#34;name&#34; : &#34;BSD 3-Clause \&#34;New\&#34; or \&#34;Revised\&#34; License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;BSD-3-Clause&#34;,&#xA;          &#34;name&#34; : &#34;BSD 3-Clause \&#34;New\&#34; or \&#34;Revised\&#34; License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;BSD-3-Clause&#34;,&#xA;            &#34;name&#34; : &#34;BSD 3-Clause \&#34;New\&#34; or \&#34;Revised\&#34; License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;BSD-3-Clause&#34;,&#xA;          &#34;name&#34; : &#34;BSD 3-Clause \&#34;New\&#34; or \&#34;Revised\&#34; License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libacl@2.3.1-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=acl-2.3.1-3.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:oci/python-component-sukmsc@sha256%3Ab4bae6cd649fa727918fa00bbf740a7fdd429feb319a7b56f28fed4c5c2b1901&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/gd@2.3.2-3.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/readline@8.1-4.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=readline-8.1-4.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/autoconf@2.69-38.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/glibc-headers@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libattr@2.5.1-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=attr-2.5.1-3.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/brotli-devel@1.0.9-6.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/pkgconf-m4@1.7.3-10.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=pkgconf-1.7.3-10.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/perl-File-Compare@1.100.600-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/set-blocking@2.0.0&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libsepol-devel@3.5-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libsepol-3.5-1.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libdnf@0.69.0-3.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libdnf-0.69.0-3.el9_2.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/llvm-libs@15.0.7-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=llvm-15.0.7-1.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libxcb@1.13.1-9.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libxcb-1.13.1-9.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/lsof@4.94.0-3.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/unique-filename@2.0.1&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=util-linux-2.37.4-10.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gnupg2-2.3.3-2.el9_0.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/perl-Class-Struct@0.66-480.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/dnf@4.14.0-5.el9_2?arch=noarch&amp;distro=rhel-9.2&amp;upstream=dnf-4.14.0-5.el9_2.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/cracklib-dicts@2.9.6-27.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=cracklib-2.9.6-27.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/cyrus-sasl@2.1.27-21.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=cyrus-sasl-2.1.27-21.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/python3-pip@21.2.3-6.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-pip-21.2.3-6.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/tcl@8.6.10-7.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=tcl-8.6.10-7.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:pypi/jinja2@3.1.6&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;non-standard&#34;,&#xA;            &#34;name&#34; : &#34;non-standard&#34;,&#xA;            &#34;category&#34; : &#34;UNKNOWN&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;non-standard&#34;,&#xA;          &#34;name&#34; : &#34;non-standard&#34;,&#xA;          &#34;category&#34; : &#34;UNKNOWN&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;non-standard&#34;,&#xA;            &#34;name&#34; : &#34;non-standard&#34;,&#xA;            &#34;category&#34; : &#34;UNKNOWN&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;non-standard&#34;,&#xA;          &#34;name&#34; : &#34;non-standard&#34;,&#xA;          &#34;category&#34; : &#34;UNKNOWN&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/cpp@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libXau-devel@1.0.9-8.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/groff-base@1.22.4-10.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/openssl-devel@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:pypi/importlib-metadata@8.7.1&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;Apache-2.0&#34;,&#xA;            &#34;name&#34; : &#34;Apache License 2.0&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;Apache-2.0&#34;,&#xA;          &#34;name&#34; : &#34;Apache License 2.0&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;Apache-2.0&#34;,&#xA;            &#34;name&#34; : &#34;Apache License 2.0&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;Apache-2.0&#34;,&#xA;          &#34;name&#34; : &#34;Apache License 2.0&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/perl-PathTools@3.78-461.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=perl-PathTools-3.78-461.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/debuglog@1.0.1&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:npm/bin-links@3.0.3&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/json-glib@1.6.6-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=json-glib-1.6.6-1.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/perl-SelectSaver@1.02-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/emoji-regex@8.0.0&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/mariadb-connector-c-config@3.2.6-1.el9_0&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtasn1-4.16.0-8.el9_1.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/acl@2.3.1-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=acl-2.3.1-3.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=librepo-1.14.5-1.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libcurl-devel@7.76.1-23.el9_2.1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=curl-7.76.1-23.el9_2.1.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libreport-filesystem@2.15.2-6.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=libreport-2.15.2-6.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/file-libs@5.39-12.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=file-5.39-12.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/promise-call-limit@1.0.1&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/libnpmpack@4.1.3&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libksba@1.5.1-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libksba-1.5.1-6.el9_1.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libcap-ng@0.8.2-7.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-ng-0.8.2-7.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libXau@1.0.9-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libXau-1.0.9-8.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/dnf-data@4.14.0-5.el9_2?arch=noarch&amp;distro=rhel-9.2&amp;upstream=dnf-4.14.0-5.el9_2.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/perl-vars@1.05-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=gmp-6.2.0-10.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/info@6.7-15.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=texinfo-6.7-15.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/apr-devel@1.7.0-11.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=apr-1.7.0-11.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/scl-utils@2.0.3-4.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/%40npmcli/git@3.0.2&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/pcre@8.44-3.el9.3?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=pcre-8.44-3.el9.3.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/perl-base@2.27-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/gdb-gdbserver@10.2-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gdb-10.2-10.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/dejavu-sans-fonts@2.37-18.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=dejavu-fonts-2.37-18.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/rpm@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libtiff@4.4.0-7.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtiff-4.4.0-7.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libxml2-2.9.13-3.el9_1.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/perl-Scalar-List-Utils@1.56-461.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=4&amp;upstream=perl-Scalar-List-Utils-1.56-461.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/safe-buffer@5.2.1&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/grep@3.6-5.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=grep-3.6-5.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/findutils@4.8.0-5.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/tpm2-tss@3.0.3-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=tpm2-tss-3.0.3-8.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:pypi/pyinotify@0.9.6&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/gpg-pubkey@5a6340b3-6229229e?distro=rhel-9.2&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:pypi/itsdangerous@2.2.0&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;non-standard&#34;,&#xA;            &#34;name&#34; : &#34;non-standard&#34;,&#xA;            &#34;category&#34; : &#34;UNKNOWN&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;non-standard&#34;,&#xA;          &#34;name&#34; : &#34;non-standard&#34;,&#xA;          &#34;category&#34; : &#34;UNKNOWN&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;non-standard&#34;,&#xA;            &#34;name&#34; : &#34;non-standard&#34;,&#xA;            &#34;category&#34; : &#34;UNKNOWN&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;non-standard&#34;,&#xA;          &#34;name&#34; : &#34;non-standard&#34;,&#xA;          &#34;category&#34; : &#34;UNKNOWN&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/boost-regex@1.75.0-8.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/openssh@8.7p1-29.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=openssh-8.7p1-29.el9_2.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libzstd@1.5.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=zstd-1.5.1-2.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/perl-Encode@3.08-462.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=4&amp;upstream=perl-Encode-3.08-462.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/perl-Term-Cap@1.17-460.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=perl-Term-Cap-1.17-460.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/popt@1.18-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=popt-1.18-8.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/readable-stream@3.6.0&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gdb-10.2-10.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libunistring@0.9.10-15.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libunistring-0.9.10-15.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/text-table@0.2.0&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/file@5.39-12.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=file-5.39-12.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/langpacks-core-font-en@3.0-16.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=langpacks-3.0-16.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libdnf-0.69.0-3.el9_2.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/%40npmcli/map-workspaces@2.0.4&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libpwquality@1.4.4-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libpwquality-1.4.4-8.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/python3-gobject-base-noarch@3.40.1-6.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/zip@3.0-35.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=zip-3.0-35.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/wcwidth@1.0.1&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=perl-Thread-Queue-3.14-460.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/gpgme@1.15.1-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gpgme-1.15.1-6.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/ms@2.1.3&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:npm/path-is-absolute@1.0.1&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/glib2-devel@2.68.4-6.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/pyproject-srpm-macros@1.6.2-1.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=pyproject-rpm-macros-1.6.2-1.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=perl-Digest-1.19-4.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glib2-2.68.4-6.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:pypi/requests@2.25.1&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;Apache-2.0&#34;,&#xA;            &#34;name&#34; : &#34;Apache License 2.0&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;Apache-2.0&#34;,&#xA;          &#34;name&#34; : &#34;Apache License 2.0&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;Apache-2.0&#34;,&#xA;            &#34;name&#34; : &#34;Apache License 2.0&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;Apache-2.0&#34;,&#xA;          &#34;name&#34; : &#34;Apache License 2.0&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libsigsegv@2.13-4.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libsigsegv-2.13-4.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/zlib@1.2.11-39.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=zlib-1.2.11-39.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/read-package-json@5.0.2&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/redhat-release@9.2-0.13.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=redhat-release-9.2-0.13.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/perl-libs@5.32.1-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=4&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/rootfiles@8.1-31.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=rootfiles-8.1-31.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libffi@3.4.2-7.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libffi-3.4.2-7.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/python3-dbus@1.2.18-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=dbus-python-1.2.18-2.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/perl-Errno@1.30-480.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libassuan@2.5.5-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libassuan-2.5.5-3.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/alternatives@1.20-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=chkconfig-1.20-2.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=dbus-1.12.20-7.el9_1.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/gettext@0.21-7.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gettext-0.21-7.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/perl-POSIX@1.94-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/ip@2.0.0&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:npm/validate-npm-package-license@3.0.4&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;Apache-2.0&#34;,&#xA;            &#34;name&#34; : &#34;Apache License 2.0&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;Apache-2.0&#34;,&#xA;          &#34;name&#34; : &#34;Apache License 2.0&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;Apache-2.0&#34;,&#xA;            &#34;name&#34; : &#34;Apache License 2.0&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;Apache-2.0&#34;,&#xA;          &#34;name&#34; : &#34;Apache License 2.0&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:npm/rimraf@3.0.2&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:npm/%40tootallnate/once@2.0.0&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:npm/yallist@4.0.0&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/cmake@3.20.2-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=cmake-3.20.2-8.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libpath_utils@0.2.1-53.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/nodejs@16.19.1-1.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=nodejs-16.19.1-1.el9_2.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/%40npmcli/package-json@2.0.0&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/kernel-headers@5.14.0-284.11.1.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=kernel-5.14.0-284.11.1.el9_2.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libidn2@2.3.0-7.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libidn2-2.3.0-7.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/read@1.0.7&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/annobin@11.05-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=annobin-11.05-1.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/patch@2.7.6-16.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=patch-2.7.6-16.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/ignore-walk@5.0.1&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/npth@1.6-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=npth-1.6-8.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/libnpmpublish@6.0.5&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:npm/safer-buffer@2.1.2&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/mpfr@4.1.0-7.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=mpfr-4.1.0-7.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/perl-File-Find@1.37-480.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/npm-install-checks@5.0.0&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;BSD-2-Clause&#34;,&#xA;            &#34;name&#34; : &#34;BSD 2-Clause \&#34;Simplified\&#34; License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;BSD-2-Clause&#34;,&#xA;          &#34;name&#34; : &#34;BSD 2-Clause \&#34;Simplified\&#34; License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;BSD-2-Clause&#34;,&#xA;            &#34;name&#34; : &#34;BSD 2-Clause \&#34;Simplified\&#34; License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;BSD-2-Clause&#34;,&#xA;          &#34;name&#34; : &#34;BSD 2-Clause \&#34;Simplified\&#34; License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/perl-AutoLoader@5.74-480.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/fs-minipass@2.1.0&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=usermode-1.114-4.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-setuptools-53.0.0-12.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/nodejs-full-i18n@16.19.1-1.el9_2&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/elfutils-libelf@0.188-3.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=2&amp;upstream=shadow-utils-4.9-6.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/ip-regex@4.3.0&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:npm/archy@1.0.0&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/xorg-x11-proto-devel@2021.4-2.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/json-c@0.14-11.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=json-c-0.14-11.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/git@2.39.3-1.el9_2&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/spdx-correct@3.1.1&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;Apache-2.0&#34;,&#xA;            &#34;name&#34; : &#34;Apache License 2.0&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;Apache-2.0&#34;,&#xA;          &#34;name&#34; : &#34;Apache License 2.0&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;Apache-2.0&#34;,&#xA;            &#34;name&#34; : &#34;Apache License 2.0&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;Apache-2.0&#34;,&#xA;          &#34;name&#34; : &#34;Apache License 2.0&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libtalloc@2.3.4-1.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/openldap@2.6.2-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=openldap-2.6.2-3.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/gpg-pubkey@fd431d51-4ae0493b?distro=rhel-8.10&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/lz4-libs@1.9.3-5.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=lz4-1.9.3-5.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libyaml@0.2.5-7.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libyaml-0.2.5-7.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.5?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=httpd-2.4.53-11.el9_2.5.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/python3-chardet@4.0.0-5.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/dbus-libs@1.12.20-7.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=dbus-1.12.20-7.el9_1.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/xml-common@0.6.3-58.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=sgml-common-0.6.3-58.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libpsl@0.21.1-5.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libpsl-0.21.1-5.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/opener@1.5.2&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;WTFPL&#34;,&#xA;            &#34;name&#34; : &#34;Do What The F*ck You Want To Public License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : false,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;UNKNOWN&#34;&#xA;          }, {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;(WTFPL OR MIT)&#34;,&#xA;          &#34;name&#34; : &#34;Do What The F*ck You Want To Public License OR MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;WTFPL&#34;,&#xA;            &#34;name&#34; : &#34;Do What The F*ck You Want To Public License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : false,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;UNKNOWN&#34;&#xA;          }, {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;(WTFPL OR MIT)&#34;,&#xA;          &#34;name&#34; : &#34;Do What The F*ck You Want To Public License OR MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:npm/npm-bundled@1.1.2&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libarchive-3.5.3-4.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=cmake-3.20.2-8.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libquadmath@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:pypi/six@1.15.0&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=nghttp2-1.43.0-5.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-setuptools-53.0.0-12.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/minimatch@5.1.0&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libverto@0.3.2-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libverto-0.3.2-3.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/perl-Net-SSLeay@1.92-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=perl-Net-SSLeay-1.92-2.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/spdx-expression-parse@3.0.1&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/systemd-rpm-macros@252-13.el9_2&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/string-width@4.2.3&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:pypi/werkzeug@3.1.8&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;BSD-3-Clause&#34;,&#xA;            &#34;name&#34; : &#34;BSD 3-Clause \&#34;New\&#34; or \&#34;Revised\&#34; License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;BSD-3-Clause&#34;,&#xA;          &#34;name&#34; : &#34;BSD 3-Clause \&#34;New\&#34; or \&#34;Revised\&#34; License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;BSD-3-Clause&#34;,&#xA;            &#34;name&#34; : &#34;BSD 3-Clause \&#34;New\&#34; or \&#34;Revised\&#34; License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;BSD-3-Clause&#34;,&#xA;          &#34;name&#34; : &#34;BSD 3-Clause \&#34;New\&#34; or \&#34;Revised\&#34; License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=nss_wrapper-1.1.13-1.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/socks-proxy-agent@7.0.0&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libfdisk@2.37.4-10.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/semver@7.3.7&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libselinux@3.5-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libselinux-3.5-1.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/perl-Data-Dumper@2.174-462.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=perl-Data-Dumper-2.174-462.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/string_decoder@1.3.0&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libxcrypt@4.4.18-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libxcrypt-4.4.18-3.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/diff@5.1.0&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;BSD-3-Clause&#34;,&#xA;            &#34;name&#34; : &#34;BSD 3-Clause \&#34;New\&#34; or \&#34;Revised\&#34; License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;BSD-3-Clause&#34;,&#xA;          &#34;name&#34; : &#34;BSD 3-Clause \&#34;New\&#34; or \&#34;Revised\&#34; License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;BSD-3-Clause&#34;,&#xA;            &#34;name&#34; : &#34;BSD 3-Clause \&#34;New\&#34; or \&#34;Revised\&#34; License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;BSD-3-Clause&#34;,&#xA;          &#34;name&#34; : &#34;BSD 3-Clause \&#34;New\&#34; or \&#34;Revised\&#34; License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/langpacks-en@3.0-16.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=langpacks-3.0-16.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/columnify@1.6.0&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:npm/npm-packlist@5.1.3&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=openssl-3.0.7-6.el9_2.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=xz-5.2.5-8.el9_0.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/%40npmcli/ci-detect@2.0.0&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/procps-ng@3.3.17-11.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=procps-ng-3.3.17-11.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libverto-devel@0.3.2-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libverto-0.3.2-3.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/nopt@5.0.0&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/fonts-srpm-macros@2.0.5-7.el9.1?arch=noarch&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=fonts-rpm-macros-2.0.5-7.el9.1.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libevent@2.1.12-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libevent-2.1.12-6.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/sed@4.8-9.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=sed-4.8-9.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/setup@2.13.7-9.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=setup-2.13.7-9.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/jsonparse@1.3.1&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/python3-pysocks@1.7.1-12.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-pysocks-1.7.1-12.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=pygobject3-3.40.1-6.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gcc-11.3.1-4.3.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ncurses-6.2-8.20210508.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libgpg-error@1.42-5.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libgpg-error-1.42-5.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/rpm-build-libs@4.16.1.3-22.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=rpm-4.16.1.3-22.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/gzip@1.12-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gzip-1.12-1.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/pcre2@10.40-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=pcre2-10.40-2.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/minipass-fetch@2.1.1&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:npm/ssri@9.0.1&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libmodulemd-2.13.0-2.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/perl-Getopt-Long@2.52-4.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=perl-Getopt-Long-2.52-4.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/iconv-lite@0.6.3&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/mailcap@2.1.49-5.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=mailcap-2.1.49-5.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/fastest-levenshtein@1.0.12&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/krb5-libs@1.20.1-8.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/npm-audit-report@3.0.0&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:npm/negotiator@0.6.3&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libicu@67.1-9.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=icu-67.1-9.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/basesystem@11-13.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=basesystem-11-13.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/gawk@5.1.0-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gawk-5.1.0-6.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/perl-Term-ANSIColor@5.01-461.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=perl-Term-ANSIColor-5.01-461.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/concat-map@0.0.1&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/publicsuffix-list-dafsa@20210518-3.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/python3-librepo@1.14.5-1.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/systemd-pam@252-13.el9_2&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/pcre2-syntax@10.40-2.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=pcre2-10.40-2.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/perl-srpm-macros@1-41.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=perl-srpm-macros-1-41.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=httpd-2.4.53-11.el9_2.5.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/which@2.21-28.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=which-2.21-28.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libsepol@3.5-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libsepol-3.5-1.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/npm-normalize-package-bin@1.0.1&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/hunspell-filesystem@1.7.0-11.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=hunspell-1.7.0-11.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libtool-ltdl@2.4.6-45.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libtool-2.4.6-45.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libgpg-error-devel@1.42-5.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libgpg-error-1.42-5.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/libnpmhook@8.0.4&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:npm/%40npmcli/metavuln-calculator@3.1.1&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/apr-util-openssl@1.6.1-20.el9_2.1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=apr-util-1.6.1-20.el9_2.1.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/%40colors/colors@1.5.0&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:npm/color-support@1.1.3&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:npm/imurmurhash@0.1.4&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libxml2-2.9.13-3.el9_1.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/treeverse@2.0.0&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/audit-libs@3.0.7-103.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=audit-3.0.7-103.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libsolv@0.7.22-4.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libsolv-0.7.22-4.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/read-package-json-fast@2.0.3&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:npm/which@2.0.2&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:npm/readdir-scoped-modules@1.1.0&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:npm/balanced-match@1.0.2&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:npm/cli-table3@0.6.2&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/gobject-introspection@1.68.0-11.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gobject-introspection-1.68.0-11.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/gd-devel@2.3.2-3.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libbrotli@1.0.9-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=brotli-1.0.9-6.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/hunspell-en@0.20140811.1-20.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=hunspell-en-0.20140811.1-20.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/perl-Digest-MD5@2.58-4.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/perl-libnet@3.13-4.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=binutils-2.35.2-37.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/glibc-gconv-extra@2.34-60.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=glibc-2.34-60.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/dbus-common@1.12.20-7.el9_1&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/inflight@1.0.6&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/ghc-srpm-macros@1.5.0-6.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/abbrev@1.1.1&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/brotli@1.0.9-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=brotli-1.0.9-6.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/p11-kit-trust@0.24.1-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=p11-kit-0.24.1-2.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/bsdtar@3.5.3-4.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/ansi-regex@5.0.1&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libuv@1.42.0-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=libuv-1.42.0-1.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/signal-exit@3.0.7&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/python3@3.9.16-1.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/kmod-libs@28-7.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/python-srpm-macros@3.9-52.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-rpm-macros-3.9-52.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=redhat-rpm-config-199-1.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/atlas@3.10.3-17.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=atlas-3.10.3-17.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=freetype-2.10.4-9.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=python-six-1.15.0-9.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/sqlite-devel@3.34.1-6.el9_1&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/%40npmcli/move-file@2.0.1&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/go-srpm-macros@3.2.0-1.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=go-rpm-macros-3.2.0-1.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/json-parse-even-better-errors@2.3.1&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:npm/minipass-flush@1.0.5&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/krb5-devel@1.20.1-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=krb5-1.20.1-8.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/debug@4.3.4&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:npm/%40npmcli/node-gyp@2.0.0&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libcom_err@1.46.5-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=e2fsprogs-1.46.5-3.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/environment-modules@5.0.1-2.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch&amp;distro=rhel-9.2&amp;upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/has-unicode@2.0.1&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:npm/agentkeepalive@4.2.1&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:npm/defaults@1.0.3&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/dmidecode@3.3-7.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/perl-overload@1.31-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/glob@7.2.3&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/ocaml-srpm-macros@6-6.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=ocaml-srpm-macros-6-6.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libxcrypt-devel@4.4.18-3.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libxcrypt-4.4.18-3.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/atlas-devel@3.10.3-17.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=atlas-3.10.3-17.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/less@590-1.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=less-590-1.el9_0.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/perl-Fcntl@1.13-480.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/fs.realpath@1.0.0&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/keyutils-libs@1.6.3-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=keyutils-1.6.3-1.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/python3-gpg@1.15.1-6.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=gpgme-1.15.1-6.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/pkgconf@1.7.3-10.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=pkgconf-1.7.3-10.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libedit@3.1-37.20210216cvs.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libedit-3.1-37.20210216cvs.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/p-map@4.0.0&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:pypi/ethtool@0.15&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;GPL-2.0&#34;,&#xA;            &#34;name&#34; : &#34;GNU General Public License v2.0 only&#34;,&#xA;            &#34;isDeprecated&#34; : true,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;STRONG_COPYLEFT&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;GPL-2.0&#34;,&#xA;          &#34;name&#34; : &#34;GNU General Public License v2.0 only&#34;,&#xA;          &#34;category&#34; : &#34;STRONG_COPYLEFT&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;GPL-2.0&#34;,&#xA;            &#34;name&#34; : &#34;GNU General Public License v2.0 only&#34;,&#xA;            &#34;isDeprecated&#34; : true,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;STRONG_COPYLEFT&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;GPL-2.0&#34;,&#xA;          &#34;name&#34; : &#34;GNU General Public License v2.0 only&#34;,&#xA;          &#34;category&#34; : &#34;STRONG_COPYLEFT&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:npm/inherits@2.0.4&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:npm/promise-retry@2.0.1&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libicu-devel@67.1-9.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=icu-67.1-9.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/minizlib@2.1.2&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/filesystem@3.16-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=filesystem-3.16-2.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/libnpmfund@3.0.5&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:npm/function-bind@1.1.1&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/subscription-manager-rhsm-certificates@20220623-1.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=subscription-manager-rhsm-certificates-20220623-1.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/brace-expansion@1.1.11&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/pcre2-utf32@10.40-2.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=pcre2-10.40-2.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/pcre-cpp@8.44-3.el9.3?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=pcre-8.44-3.el9.3.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/bash@5.1.8-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=bash-5.1.8-6.el9_1.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libkadm5@1.20.1-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=krb5-1.20.1-8.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:pypi/setuptools@53.0.0&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/systemd-libs@252-13.el9_2&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:pypi/subscription-manager@1.29.33.1&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/coreutils-single@8.32-34.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=coreutils-8.32-34.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/perl-File-Basename@2.85-480.el9?arch=noarch&amp;distro=rhel-9.2&amp;epoch=0&amp;upstream=perl-5.32.1-480.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/librhsm@0.0.3-7.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=librhsm-0.0.3-7.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:npm/strip-ansi@6.0.1&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/perl-Text-Tabs%2BWrap@2013.0523-460.el9?arch=noarch&amp;distro=rhel-9.2&amp;upstream=perl-Text-Tabs%2BWrap-2013.0523-460.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/python3-systemd@234-18.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/sqlite@3.34.1-6.el9_1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=sqlite-3.34.1-6.el9_1.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=python3.9-3.9.16-1.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:pypi/idna@2.10&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;non-standard&#34;,&#xA;            &#34;name&#34; : &#34;non-standard&#34;,&#xA;            &#34;category&#34; : &#34;UNKNOWN&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;non-standard&#34;,&#xA;          &#34;name&#34; : &#34;non-standard&#34;,&#xA;          &#34;category&#34; : &#34;UNKNOWN&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;non-standard&#34;,&#xA;            &#34;name&#34; : &#34;non-standard&#34;,&#xA;            &#34;category&#34; : &#34;UNKNOWN&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;non-standard&#34;,&#xA;          &#34;name&#34; : &#34;non-standard&#34;,&#xA;          &#34;category&#34; : &#34;UNKNOWN&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:npm/proc-log@2.0.1&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;ISC&#34;,&#xA;            &#34;name&#34; : &#34;ISC License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;ISC&#34;,&#xA;          &#34;name&#34; : &#34;ISC License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:pypi/gpg@1.15.1&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=libcap-2.48-8.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/gdbm-libs@1.19-4.el9?arch=x86_64&amp;distro=rhel-9.2&amp;epoch=1&amp;upstream=gdbm-1.19-4.el9.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libmount@2.37.4-10.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/nettle@3.8-3.el9_0?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=nettle-3.8-3.el9_0.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64&amp;distro=rhel-9.2&amp;upstream=curl-7.76.1-23.el9_2.1.src.rpm&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      }&#xA;    }&#xA;  } ]&#xA;}&#xA;pod: python-component-sukmsc-on-pull-request-g52js-tpa-scan-pod | container step-oci-attach-report: &#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc&#xA;Attaching tpa-report-amd64.json to quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc@sha256:b4bae6cd649fa727918fa00bbf740a7fdd429feb319a7b56f28fed4c5c2b1901&#xA;[retry] executing: oras attach --no-tty --format go-template=\{\{.digest\}\} --registry-config /tmp/auth/config.json --artifact-type application/vnd.redhat.tpa-report+json quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc@sha256:b4bae6cd649fa727918fa00bbf740a7fdd429feb319a7b56f28fed4c5c2b1901 tpa-report-amd64.json:application/vnd.redhat.tpa-report+json&#xA;&#xA;pod: python-component-sukmsc-on-pull-request-g52js-tpa-scan-pod | container step-conftest-vulnerabilities: &#xA;[&#xA;&#x9;{&#xA;&#x9;&#x9;&#34;filename&#34;: &#34;/tekton/home/tpa-report-amd64.json&#34;,&#xA;&#x9;&#x9;&#34;namespace&#34;: &#34;required_checks&#34;,&#xA;&#x9;&#x9;&#34;successes&#34;: 4,&#xA;&#x9;&#x9;&#34;warnings&#34;: [&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found 14 critical vulnerabilities.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Source: redhat-csaf. Affected dependencies: pkg:rpm/redhat/rsync@3.2.3-19.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rsync-3.2.3-19.el9.src.rpm [direct] (CVE-2024-12084), pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [direct] (CVE-2024-38474, CVE-2024-38475, CVE-2024-38476), pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [direct] (CVE-2024-38474, CVE-2024-38475, CVE-2024-38476), pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [direct] (CVE-2024-38474, CVE-2024-38475, CVE-2024-38476), pkg:rpm/redhat/npm@8.19.3-1.16.19.1.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm [direct] (CVE-2023-39332), pkg:rpm/redhat/nodejs-full-i18n@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm [direct] (CVE-2023-39332), pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [direct] (CVE-2024-38474, CVE-2024-38475, CVE-2024-38476), pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm [direct] (CVE-2023-38408), pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [direct] (CVE-2024-38474, CVE-2024-38475, CVE-2024-38476), pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm [direct] (CVE-2024-32002), pkg:rpm/redhat/nodejs-docs@16.19.1-1.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm [direct] (CVE-2023-39332), pkg:rpm/redhat/libkadm5@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [direct] (CVE-2024-3596), pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [direct] (CVE-2024-38474, CVE-2024-38475, CVE-2024-38476), pkg:rpm/redhat/krb5-devel@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [direct] (CVE-2024-3596), pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [direct] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/dbus-libs@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/dbus-libs@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-19.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rsync-3.2.3-19.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-19.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rsync-3.2.3-19.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-pysocks@1.7.1-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pysocks-1.7.1-12.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-pysocks@1.7.1-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pysocks-1.7.1-12.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=procps-ng-3.3.17-11.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=procps-ng-3.3.17-11.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20221215-1.git9a18988.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=crypto-policies-20221215-1.git9a18988.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20221215-1.git9a18988.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=crypto-policies-20221215-1.git9a18988.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm] (CVE-2024-38474, CVE-2024-38475, CVE-2024-38476), pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm] (CVE-2024-38474, CVE-2024-38475, CVE-2024-38476), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/httpd-filesystem@2.4.53-11.el9_2.5?arch=noarch\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm] (CVE-2024-38474, CVE-2024-38475, CVE-2024-38476), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-38474, CVE-2024-38475, CVE-2024-38476), pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-38474, CVE-2024-38475, CVE-2024-38476), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/httpd-filesystem@2.4.53-11.el9_2.5?arch=noarch\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-38474, CVE-2024-38475, CVE-2024-38476), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-38474, CVE-2024-38475, CVE-2024-38476), pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-38474, CVE-2024-38475, CVE-2024-38476), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/httpd-filesystem@2.4.53-11.el9_2.5?arch=noarch\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-38474, CVE-2024-38475, CVE-2024-38476), pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/apr-util-openssl@1.6.1-20.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-util-1.6.1-20.el9_2.1.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/apr-util-openssl@1.6.1-20.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-util-1.6.1-20.el9_2.1.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/openssl-devel@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-38474, CVE-2024-38475, CVE-2024-38476), pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-38474, CVE-2024-38475, CVE-2024-38476), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/httpd-filesystem@2.4.53-11.el9_2.5?arch=noarch\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-38474, CVE-2024-38475, CVE-2024-38476), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm] (CVE-2024-38474, CVE-2024-38475, CVE-2024-38476), pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm] (CVE-2024-38474, CVE-2024-38475, CVE-2024-38476), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/httpd-filesystem@2.4.53-11.el9_2.5?arch=noarch\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm] (CVE-2024-38474, CVE-2024-38475, CVE-2024-38476), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/nodejs@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.3-1.16.19.1.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2023-39332), pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.3-1.16.19.1.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.3-1.16.19.1.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.3-1.16.19.1.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/nodejs@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2023-39332), pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-decorator@4.4.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-decorator-4.4.2-6.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-decorator@4.4.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-decorator-4.4.2-6.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=environment-modules-5.0.1-2.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=environment-modules-5.0.1-2.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-devel@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-devel@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-systemd@234-18.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-systemd-234-18.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-systemd@234-18.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-systemd-234-18.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-38474, CVE-2024-38475, CVE-2024-38476), pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-38474, CVE-2024-38475, CVE-2024-38476), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/httpd-filesystem@2.4.53-11.el9_2.5?arch=noarch\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-38474, CVE-2024-38475, CVE-2024-38476), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/openssh@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2023-38408), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-38474, CVE-2024-38475, CVE-2024-38476), pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-38474, CVE-2024-38475, CVE-2024-38476), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/httpd-filesystem@2.4.53-11.el9_2.5?arch=noarch\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-38474, CVE-2024-38475, CVE-2024-38476), pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/libwebp-devel@1.2.0-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libwebp-1.2.0-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-4863), pkg:rpm/redhat/libwebp@1.2.0-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libwebp-1.2.0-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-4863), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2023-38408), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/openssh@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2023-38408), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2024-32002), pkg:rpm/redhat/git-core@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2024-32002), pkg:rpm/redhat/perl-Git@2.39.3-1.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2024-32002), pkg:rpm/redhat/git-core-doc@2.39.3-1.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2024-32002), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-pip@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-pip@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.15-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-ethtool-0.15-2.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.15-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-ethtool-0.15-2.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/libkadm5@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/libkadm5@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/libkadm5@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-38474, CVE-2024-38475, CVE-2024-38476), pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-38474, CVE-2024-38475, CVE-2024-38476), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/httpd-filesystem@2.4.53-11.el9_2.5?arch=noarch\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-38474, CVE-2024-38475, CVE-2024-38476), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/sscg@3.0.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sscg-3.0.0-7.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/sscg@3.0.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sscg-3.0.0-7.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/krb5-devel@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/krb5-devel@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/libkadm5@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/krb5-devel@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/krb5-devel@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-inotify@0.9.6-25.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-inotify-0.9.6-25.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-inotify@0.9.6-25.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-inotify-0.9.6-25.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/libwebp@1.2.0-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libwebp-1.2.0-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-4863), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/xml-common@0.6.3-58.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=sgml-common-0.6.3-58.el9.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;rhtpa_critical_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 14&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found 266 high vulnerabilities.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Source: osv-github. Affected dependencies: pkg:pypi/setuptools@53.0.0 [direct] (CVE-2024-6345, CVE-2022-40897), pkg:npm/tar@6.1.11 [direct] (CVE-2026-23950, CVE-2026-24842, CVE-2026-26960), pkg:npm/ip@2.0.0 [direct] (CVE-2024-29415), pkg:npm/minimatch@5.1.0 [direct] (CVE-2026-27903, CVE-2026-27904), pkg:npm/semver@7.3.7 [direct] (CVE-2022-25883), pkg:npm/minimatch@3.1.2 [direct] (CVE-2026-27903, CVE-2026-27904), pkg:npm/npm@8.19.3 [direct] (CVE-2026-0775), pkg:pypi/urllib3@1.26.5 [transitive via pkg:pypi/requests@2.25.1] (CVE-2026-21441); Source: redhat-csaf. Affected dependencies: pkg:rpm/redhat/rsync@3.2.3-19.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rsync-3.2.3-19.el9.src.rpm [direct] (CVE-2024-12085), pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm [direct] (CVE-2023-43622, CVE-2023-45802, CVE-2024-27316, CVE-2025-49630), pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [direct] (CVE-2023-27522, CVE-2023-31122, CVE-2024-38477, CVE-2024-47252, CVE-2025-23048, CVE-2025-49812, CVE-2024-39573, CVE-2025-58098), pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [direct] (CVE-2023-27522, CVE-2023-31122, CVE-2024-38477, CVE-2024-47252, CVE-2025-23048, CVE-2025-49812, CVE-2024-39573, CVE-2025-58098), pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm [direct] (CVE-2025-27363), pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [direct] (CVE-2023-27522, CVE-2023-31122, CVE-2024-38477, CVE-2024-47252, CVE-2025-23048, CVE-2025-49812, CVE-2024-39573, CVE-2025-58098), pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm [direct] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/bsdtar@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm [direct] (CVE-2025-5914, CVE-2026-4111, CVE-2026-4424, CVE-2026-5121), pkg:rpm/redhat/npm@8.19.3-1.16.19.1.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm [direct] (CVE-2023-32006, CVE-2022-4904, CVE-2023-32002, CVE-2024-21892, CVE-2024-21896, CVE-2025-23083, CVE-2025-6965, CVE-2021-35065, CVE-2022-25881, CVE-2022-25883, CVE-2023-23918, CVE-2023-23919, CVE-2023-24807, CVE-2023-30581, CVE-2023-30590, CVE-2023-32067, CVE-2023-32559, CVE-2023-38552, CVE-2023-39331, CVE-2023-44487, CVE-2024-22019, CVE-2024-27983, CVE-2025-23166, CVE-2025-59465, CVE-2026-1526, CVE-2026-1528, CVE-2026-21710, CVE-2026-2229, CVE-2026-27135, CVE-2024-22017, CVE-2025-3277, CVE-2026-1525, CVE-2025-55130, CVE-2025-55131, CVE-2023-30589, CVE-2025-31498), pkg:rpm/redhat/nodejs-full-i18n@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm [direct] (CVE-2023-32006, CVE-2022-4904, CVE-2022-35255, CVE-2023-32002, CVE-2024-21892, CVE-2024-21896, CVE-2025-23083, CVE-2025-6965, CVE-2021-35065, CVE-2022-25881, CVE-2022-25883, CVE-2022-3517, CVE-2022-43548, CVE-2023-23918, CVE-2023-23919, CVE-2023-24807, CVE-2023-30581, CVE-2023-30590, CVE-2023-32067, CVE-2023-32559, CVE-2023-38552, CVE-2023-39331, CVE-2023-44487, CVE-2024-22019, CVE-2024-27983, CVE-2025-23166, CVE-2025-59465, CVE-2026-1526, CVE-2026-1528, CVE-2026-21710, CVE-2026-2229, CVE-2026-27135, CVE-2024-22017, CVE-2025-3277, CVE-2026-1525, CVE-2025-55130, CVE-2025-55131, CVE-2023-30589, CVE-2025-31498), pkg:rpm/redhat/python3-devel@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [direct] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [direct] (CVE-2023-27522, CVE-2023-31122, CVE-2024-38477, CVE-2024-47252, CVE-2025-23048, CVE-2025-49812, CVE-2024-39573, CVE-2025-58098), pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm [direct] (CVE-2026-3497, CVE-2024-6387, CVE-2026-35385, CVE-2024-6409), pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [direct] (CVE-2023-27522, CVE-2023-31122, CVE-2024-38477, CVE-2024-47252, CVE-2025-23048, CVE-2025-49812, CVE-2025-59775, CVE-2024-39573, CVE-2025-58098), pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm [direct] (CVE-2023-3899), pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm [direct] (CVE-2025-48385, CVE-2024-32004, CVE-2025-48384, CVE-2024-52005, CVE-2024-32465), pkg:rpm/redhat/nodejs-docs@16.19.1-1.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm [direct] (CVE-2023-32006, CVE-2022-4904, CVE-2022-35255, CVE-2023-32002, CVE-2024-21892, CVE-2024-21896, CVE-2025-23083, CVE-2025-6965, CVE-2021-35065, CVE-2022-25881, CVE-2022-25883, CVE-2022-3517, CVE-2022-43548, CVE-2023-23918, CVE-2023-23919, CVE-2023-24807, CVE-2023-30581, CVE-2023-30590, CVE-2023-32067, CVE-2023-32559, CVE-2023-38552, CVE-2023-39331, CVE-2023-44487, CVE-2024-22019, CVE-2024-27983, CVE-2025-23166, CVE-2025-59465, CVE-2026-1526, CVE-2026-1528, CVE-2026-21710, CVE-2026-2229, CVE-2026-27135, CVE-2024-22017, CVE-2025-3277, CVE-2026-1525, CVE-2025-55130, CVE-2025-55131, CVE-2023-30589, CVE-2025-31498), pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm [direct] (CVE-2023-2953), pkg:rpm/redhat/libkadm5@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [direct] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370), pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm [direct] (CVE-2025-66418, CVE-2025-66471, CVE-2026-21441), pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [direct] (CVE-2023-27522, CVE-2023-31122, CVE-2024-38477, CVE-2024-47252, CVE-2025-23048, CVE-2025-49812, CVE-2024-39573, CVE-2025-58098), pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpq-13.5-1.el9.src.rpm [direct] (CVE-2025-1094, CVE-2025-12818), pkg:rpm/redhat/krb5-devel@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [direct] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370), pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm [direct] (CVE-2023-3899), pkg:rpm/redhat/libcurl-devel@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [direct] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm [direct] (CVE-2023-3899), pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxslt-1.1.34-9.el9.src.rpm [direct] (CVE-2024-55549, CVE-2025-24855, CVE-2025-7425, CVE-2025-7424), pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [direct] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/sqlite@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [direct] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/libicu-devel@67.1-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=icu-67.1-9.el9.src.rpm [direct] (CVE-2025-5222), pkg:rpm/redhat/glibc-locale-source@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [direct] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm [direct] (CVE-2023-47038), pkg:rpm/redhat/xz@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [direct] (CVE-2025-31115), pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [direct] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/glibc-headers@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [direct] (CVE-2024-2961, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [direct] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [direct] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/sqlite-devel@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [direct] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/dmidecode@3.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dmidecode-3.3-7.el9.src.rpm [direct] (CVE-2023-30630), pkg:rpm/redhat/glibc-gconv-extra@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [direct] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/vim-minimal@8.2.2637-20.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=vim-8.2.2637-20.el9_1.src.rpm [direct] (CVE-2026-34982, CVE-2026-25749, CVE-2026-33412, CVE-2023-4752), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-devel@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-headers@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2024-2961, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/kernel-headers@5.14.0-284.11.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=kernel-5.14.0-284.11.1.el9_2.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-44466, CVE-2024-5154, CVE-2025-21927, CVE-2023-1652, CVE-2023-52922, CVE-2024-36971, CVE-2025-21756, CVE-2025-22020, CVE-2025-38052, CVE-2025-38087, CVE-2022-41723, CVE-2025-38471, CVE-2024-42284, CVE-2024-53104, CVE-2025-37750, CVE-2025-38250, CVE-2022-49846, CVE-2023-52933, CVE-2023-53751, CVE-2023-6606, CVE-2023-6610, CVE-2024-35937, CVE-2024-38538, CVE-2024-53150, CVE-2024-57947, CVE-2025-21887, CVE-2025-21893, CVE-2025-21920, CVE-2025-21969, CVE-2025-21979, CVE-2025-21993, CVE-2025-21997, CVE-2025-22026, CVE-2025-22055, CVE-2025-22058, CVE-2025-22104, CVE-2025-22113, CVE-2025-22121, CVE-2025-37738, CVE-2025-37799, CVE-2025-38264, CVE-2022-49977, CVE-2022-50066, CVE-2023-53047, CVE-2023-53107, CVE-2023-6932, CVE-2024-0646, CVE-2024-46858, CVE-2024-50154, CVE-2024-53141, CVE-2025-21727, CVE-2025-21764, CVE-2025-21867, CVE-2025-21919, CVE-2025-21926, CVE-2025-21966, CVE-2025-22004, CVE-2025-22126, CVE-2025-37797, CVE-2025-37803, CVE-2025-37890, CVE-2025-37914, CVE-2025-37943, CVE-2025-38079, CVE-2025-38086, CVE-2025-38124, CVE-2025-38177, CVE-2025-38200, CVE-2025-38332), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2026-24882, CVE-2025-68973), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2025-5914, CVE-2026-4111, CVE-2026-4424, CVE-2026-5121), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2024-0553, CVE-2024-0567), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openldap@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/emacs-filesystem@27.2-8.el9_2.1?arch=noarch\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=emacs-27.2-8.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2025-1244, CVE-2024-30205, CVE-2024-39331, CVE-2024-53920), pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/vim-filesystem@8.2.2637-20.el9_1?arch=noarch\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=vim-8.2.2637-20.el9_1.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2026-34982, CVE-2026-25749, CVE-2026-33412, CVE-2023-4752), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2025-5914, CVE-2026-4111, CVE-2026-4424, CVE-2026-5121), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/libuv@1.42.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=libuv-1.42.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2024-24806), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/libcomps@0.1.18-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcomps-0.1.18-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2026-1312, CVE-2026-0980, CVE-2026-1207, CVE-2026-1287, CVE-2026-1530, CVE-2026-1531, CVE-2026-1961, CVE-2021-46877, CVE-2025-14550, CVE-2025-6176, CVE-2026-1285, CVE-2025-68121), pkg:rpm/redhat/python3-libcomps@0.1.18-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcomps-0.1.18-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2026-1312, CVE-2026-0980, CVE-2026-1207, CVE-2026-1287, CVE-2026-1530, CVE-2026-1531, CVE-2026-1961, CVE-2021-46877, CVE-2025-14550, CVE-2025-6176, CVE-2026-1285, CVE-2025-68121), pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2026-24882, CVE-2025-68973), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2025-5914, CVE-2026-4111, CVE-2026-4424, CVE-2026-5121), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2024-0553, CVE-2024-0567), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openldap@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/dbus-libs@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/dbus-libs@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/dbus-libs@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/dbus-libs@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/dbus-libs@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/dbus-libs@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/dbus-libs@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/dbus-libs@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/dbus-libs@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/dbus-libs@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2023-5363, CVE-2026-28390, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/pam@1.5.1-14.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pam-1.5.1-14.el9.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2025-6020, CVE-2025-8941, CVE-2024-10963), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2024-0553, CVE-2024-0567), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/openldap@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-19.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rsync-3.2.3-19.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-19.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rsync-3.2.3-19.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-19.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rsync-3.2.3-19.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-19.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rsync-3.2.3-19.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-19.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rsync-3.2.3-19.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-19.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rsync-3.2.3-19.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-19.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rsync-3.2.3-19.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-19.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rsync-3.2.3-19.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2023-5363, CVE-2026-28390, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/pam@1.5.1-14.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pam-1.5.1-14.el9.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2025-6020, CVE-2025-8941, CVE-2024-10963), pkg:rpm/redhat/systemd@252-13.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-13.el9_2.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2026-29111), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/openldap@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-pysocks@1.7.1-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pysocks-1.7.1-12.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pysocks@1.7.1-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pysocks-1.7.1-12.el9.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pysocks@1.7.1-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pysocks-1.7.1-12.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pysocks@1.7.1-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pysocks-1.7.1-12.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pysocks@1.7.1-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pysocks-1.7.1-12.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pysocks@1.7.1-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pysocks-1.7.1-12.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pysocks@1.7.1-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pysocks-1.7.1-12.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pysocks@1.7.1-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pysocks-1.7.1-12.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pysocks@1.7.1-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pysocks-1.7.1-12.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pysocks@1.7.1-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pysocks-1.7.1-12.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pysocks@1.7.1-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pysocks-1.7.1-12.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-pysocks@1.7.1-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pysocks-1.7.1-12.el9.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-pysocks@1.7.1-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pysocks-1.7.1-12.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pysocks@1.7.1-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pysocks-1.7.1-12.el9.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2024-0553, CVE-2024-0567), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2023-31486, CVE-2023-47038), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2025-5914, CVE-2026-4111, CVE-2026-4424, CVE-2026-5121), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/go-srpm-macros@3.2.0-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=go-rpm-macros-3.2.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2025-61726, CVE-2026-25679), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/perl-mro@1.23-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Class-Struct@0.66-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-subs@1.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-interpreter@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overload@1.31-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-libs@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-stat@1.09-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IO@1.43-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-Basename@2.85-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-POSIX@1.94-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Symbol@1.08-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-SelectSaver@1.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Getopt-Std@1.12-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-vars@1.05-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-if@0.60.800-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Fcntl@1.13-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IPC-Open3@1.21-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Errno@1.30-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overloading@0.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2023-47038), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=procps-ng-3.3.17-11.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=procps-ng-3.3.17-11.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=procps-ng-3.3.17-11.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=procps-ng-3.3.17-11.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=procps-ng-3.3.17-11.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=procps-ng-3.3.17-11.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=procps-ng-3.3.17-11.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=procps-ng-3.3.17-11.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=procps-ng-3.3.17-11.el9.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=procps-ng-3.3.17-11.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20221215-1.git9a18988.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=crypto-policies-20221215-1.git9a18988.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20221215-1.git9a18988.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=crypto-policies-20221215-1.git9a18988.el9.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20221215-1.git9a18988.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=crypto-policies-20221215-1.git9a18988.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20221215-1.git9a18988.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=crypto-policies-20221215-1.git9a18988.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20221215-1.git9a18988.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=crypto-policies-20221215-1.git9a18988.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20221215-1.git9a18988.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=crypto-policies-20221215-1.git9a18988.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20221215-1.git9a18988.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=crypto-policies-20221215-1.git9a18988.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20221215-1.git9a18988.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=crypto-policies-20221215-1.git9a18988.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20221215-1.git9a18988.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=crypto-policies-20221215-1.git9a18988.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20221215-1.git9a18988.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=crypto-policies-20221215-1.git9a18988.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20221215-1.git9a18988.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=crypto-policies-20221215-1.git9a18988.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20221215-1.git9a18988.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=crypto-policies-20221215-1.git9a18988.el9.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20221215-1.git9a18988.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=crypto-policies-20221215-1.git9a18988.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20221215-1.git9a18988.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=crypto-policies-20221215-1.git9a18988.el9.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2023-31486, CVE-2023-47038), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/perl-POSIX@1.94-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Symbol@1.08-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-mro@1.23-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-AutoLoader@5.74-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-SelectSaver@1.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Getopt-Std@1.12-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Class-Struct@0.66-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-subs@1.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-vars@1.05-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-interpreter@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overload@1.31-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-libs@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-B@1.80-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-if@0.60.800-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-stat@1.09-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Fcntl@1.13-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IO@1.43-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-Basename@2.85-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-base@2.27-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IPC-Open3@1.21-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Errno@1.30-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overloading@0.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2023-47038), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2023-47038), pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm] (CVE-2023-27522, CVE-2023-31122, CVE-2024-38477, CVE-2024-47252, CVE-2025-23048, CVE-2025-49812, CVE-2024-39573, CVE-2025-58098), pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm] (CVE-2023-27522, CVE-2023-31122, CVE-2024-38477, CVE-2024-47252, CVE-2025-23048, CVE-2025-49812, CVE-2024-39573, CVE-2025-58098), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/httpd-filesystem@2.4.53-11.el9_2.5?arch=noarch\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm] (CVE-2023-27522, CVE-2023-31122, CVE-2024-38477, CVE-2024-47252, CVE-2025-23048, CVE-2025-49812, CVE-2025-59775, CVE-2024-39573, CVE-2025-58098), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-27522, CVE-2023-31122, CVE-2024-38477, CVE-2024-47252, CVE-2025-23048, CVE-2025-49812, CVE-2024-39573, CVE-2025-58098), pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-27522, CVE-2023-31122, CVE-2024-38477, CVE-2024-47252, CVE-2025-23048, CVE-2025-49812, CVE-2024-39573, CVE-2025-58098), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/httpd-filesystem@2.4.53-11.el9_2.5?arch=noarch\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-27522, CVE-2023-31122, CVE-2024-38477, CVE-2024-47252, CVE-2025-23048, CVE-2025-49812, CVE-2025-59775, CVE-2024-39573, CVE-2025-58098), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-27522, CVE-2023-31122, CVE-2024-38477, CVE-2024-47252, CVE-2025-23048, CVE-2025-49812, CVE-2024-39573, CVE-2025-58098), pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-27522, CVE-2023-31122, CVE-2024-38477, CVE-2024-47252, CVE-2025-23048, CVE-2025-49812, CVE-2024-39573, CVE-2025-58098), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/httpd-filesystem@2.4.53-11.el9_2.5?arch=noarch\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-27522, CVE-2023-31122, CVE-2024-38477, CVE-2024-47252, CVE-2025-23048, CVE-2025-49812, CVE-2025-59775, CVE-2024-39573, CVE-2025-58098), pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-5363, CVE-2026-28390, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-31486, CVE-2023-47038), pkg:rpm/redhat/pam@1.5.1-14.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pam-1.5.1-14.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-6020, CVE-2025-8941, CVE-2024-10963), pkg:rpm/redhat/systemd@252-13.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-13.el9_2.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2026-29111), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/expat-devel@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/perl-mro@1.23-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Class-Struct@0.66-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-subs@1.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-interpreter@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overload@1.31-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-libs@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-stat@1.09-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IO@1.43-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-Basename@2.85-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-POSIX@1.94-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Symbol@1.08-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-SelectSaver@1.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Getopt-Std@1.12-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-vars@1.05-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-if@0.60.800-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Fcntl@1.13-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IPC-Open3@1.21-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Errno@1.30-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overloading@0.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/openldap@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-47038), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/apr-util-openssl@1.6.1-20.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-util-1.6.1-20.el9_2.1.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/apr-util-openssl@1.6.1-20.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-util-1.6.1-20.el9_2.1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/apr-util-openssl@1.6.1-20.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-util-1.6.1-20.el9_2.1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/apr-util-openssl@1.6.1-20.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-util-1.6.1-20.el9_2.1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/apr-util-openssl@1.6.1-20.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-util-1.6.1-20.el9_2.1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/apr-util-openssl@1.6.1-20.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-util-1.6.1-20.el9_2.1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/apr-util-openssl@1.6.1-20.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-util-1.6.1-20.el9_2.1.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/apr-util-openssl@1.6.1-20.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-util-1.6.1-20.el9_2.1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/apr-util-openssl@1.6.1-20.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-util-1.6.1-20.el9_2.1.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/graphite2@1.3.14-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=graphite2-1.3.14-9.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2017-5436), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/freetype@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2025-27363), pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2025-27363), pkg:rpm/redhat/libX11-common@1.7.0-7.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-43787, CVE-2023-3138), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libX11@1.7.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-43787, CVE-2023-3138), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/glib2-devel@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/libpng@1.6.37-12.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=libpng-1.6.37-12.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2026-33636, CVE-2026-33416, CVE-2025-64720, CVE-2025-65018, CVE-2025-66293, CVE-2026-25646), pkg:rpm/redhat/brotli-devel@1.0.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=brotli-1.0.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2025-6176), pkg:rpm/redhat/brotli@1.0.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=brotli-1.0.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2025-6176), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/harfbuzz-devel@2.7.4-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=harfbuzz-2.7.4-8.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-25193), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2024-0553, CVE-2024-0567), pkg:rpm/redhat/libbrotli@1.0.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=brotli-1.0.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2025-6176), pkg:rpm/redhat/harfbuzz-icu@2.7.4-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=harfbuzz-2.7.4-8.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-25193), pkg:rpm/redhat/harfbuzz@2.7.4-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=harfbuzz-2.7.4-8.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-25193), pkg:rpm/redhat/libpng-devel@1.6.37-12.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=libpng-1.6.37-12.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2025-64720, CVE-2025-65018, CVE-2025-66293, CVE-2026-25646), pkg:rpm/redhat/libicu-devel@67.1-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=icu-67.1-9.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2025-5222), pkg:rpm/redhat/libicu@67.1-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=icu-67.1-9.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2025-5222), pkg:rpm/redhat/pixman@0.40.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pixman-0.40.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2022-44638), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/openssl-devel@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2023-5363, CVE-2026-28390, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/pam@1.5.1-14.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pam-1.5.1-14.el9.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2025-6020, CVE-2025-8941, CVE-2024-10963), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/dmidecode@3.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dmidecode-3.3-7.el9.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2023-30630), pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-27522, CVE-2023-31122, CVE-2024-38477, CVE-2024-47252, CVE-2025-23048, CVE-2025-49812, CVE-2024-39573, CVE-2025-58098), pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-27522, CVE-2023-31122, CVE-2024-38477, CVE-2024-47252, CVE-2025-23048, CVE-2025-49812, CVE-2024-39573, CVE-2025-58098), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/httpd-filesystem@2.4.53-11.el9_2.5?arch=noarch\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-27522, CVE-2023-31122, CVE-2024-38477, CVE-2024-47252, CVE-2025-23048, CVE-2025-49812, CVE-2025-59775, CVE-2024-39573, CVE-2025-58098), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/openldap@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2025-5914, CVE-2026-4111, CVE-2026-4424, CVE-2026-5121), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-devel@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-headers@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2024-2961, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/kernel-headers@5.14.0-284.11.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=kernel-5.14.0-284.11.1.el9_2.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-44466, CVE-2024-5154, CVE-2025-21927, CVE-2023-1652, CVE-2023-52922, CVE-2024-36971, CVE-2025-21756, CVE-2025-22020, CVE-2025-38052, CVE-2025-38087, CVE-2022-41723, CVE-2025-38471, CVE-2024-42284, CVE-2024-53104, CVE-2025-37750, CVE-2025-38250, CVE-2022-49846, CVE-2023-52933, CVE-2023-53751, CVE-2023-6606, CVE-2023-6610, CVE-2024-35937, CVE-2024-38538, CVE-2024-53150, CVE-2024-57947, CVE-2025-21887, CVE-2025-21893, CVE-2025-21920, CVE-2025-21969, CVE-2025-21979, CVE-2025-21993, CVE-2025-21997, CVE-2025-22026, CVE-2025-22055, CVE-2025-22058, CVE-2025-22104, CVE-2025-22113, CVE-2025-22121, CVE-2025-37738, CVE-2025-37799, CVE-2025-38264, CVE-2022-49977, CVE-2022-50066, CVE-2023-53047, CVE-2023-53107, CVE-2023-6932, CVE-2024-0646, CVE-2024-46858, CVE-2024-50154, CVE-2024-53141, CVE-2025-21727, CVE-2025-21764, CVE-2025-21867, CVE-2025-21919, CVE-2025-21926, CVE-2025-21966, CVE-2025-22004, CVE-2025-22126, CVE-2025-37797, CVE-2025-37803, CVE-2025-37890, CVE-2025-37914, CVE-2025-37943, CVE-2025-38079, CVE-2025-38086, CVE-2025-38124, CVE-2025-38177, CVE-2025-38200, CVE-2025-38332), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2026-24882, CVE-2025-68973), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2024-0553, CVE-2024-0567), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openldap@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm] (CVE-2025-5914, CVE-2026-4111, CVE-2026-4424, CVE-2026-5121), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm] (CVE-2023-27522, CVE-2023-31122, CVE-2024-38477, CVE-2024-47252, CVE-2025-23048, CVE-2025-49812, CVE-2024-39573, CVE-2025-58098), pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm] (CVE-2023-27522, CVE-2023-31122, CVE-2024-38477, CVE-2024-47252, CVE-2025-23048, CVE-2025-49812, CVE-2024-39573, CVE-2025-58098), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/httpd-filesystem@2.4.53-11.el9_2.5?arch=noarch\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm] (CVE-2023-27522, CVE-2023-31122, CVE-2024-38477, CVE-2024-47252, CVE-2025-23048, CVE-2025-49812, CVE-2025-59775, CVE-2024-39573, CVE-2025-58098), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/nodejs@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.3-1.16.19.1.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2023-32006, CVE-2022-4904, CVE-2022-35255, CVE-2023-32002, CVE-2024-21892, CVE-2024-21896, CVE-2025-23083, CVE-2025-6965, CVE-2021-35065, CVE-2022-25881, CVE-2022-25883, CVE-2022-3517, CVE-2022-43548, CVE-2023-23918, CVE-2023-23919, CVE-2023-24807, CVE-2023-30581, CVE-2023-30590, CVE-2023-32067, CVE-2023-32559, CVE-2023-38552, CVE-2023-39331, CVE-2023-44487, CVE-2024-22019, CVE-2024-27983, CVE-2025-23166, CVE-2025-59465, CVE-2026-1526, CVE-2026-1528, CVE-2026-21710, CVE-2026-2229, CVE-2026-27135, CVE-2024-22017, CVE-2025-3277, CVE-2026-1525, CVE-2025-55130, CVE-2025-55131, CVE-2023-30589, CVE-2025-31498), pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.3-1.16.19.1.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2023-5363, CVE-2026-28390, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.3-1.16.19.1.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.3-1.16.19.1.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.3-1.16.19.1.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.3-1.16.19.1.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.3-1.16.19.1.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/nodejs-libs@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.3-1.16.19.1.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2023-32006, CVE-2022-4904, CVE-2023-32002, CVE-2025-23083, CVE-2025-6965, CVE-2022-25881, CVE-2023-24807, CVE-2023-30581, CVE-2023-30590, CVE-2023-32067, CVE-2023-32559, CVE-2023-44487, CVE-2024-22019, CVE-2024-27983, CVE-2025-23166, CVE-2025-59465, CVE-2026-1526, CVE-2026-1528, CVE-2026-21710, CVE-2026-2229, CVE-2026-27135, CVE-2025-3277, CVE-2026-1525, CVE-2025-55130, CVE-2025-55131, CVE-2023-30589, CVE-2025-31498), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.3-1.16.19.1.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.3-1.16.19.1.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.3-1.16.19.1.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libbrotli@1.0.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=brotli-1.0.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.3-1.16.19.1.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2025-6176), pkg:rpm/redhat/nodejs@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2023-32006, CVE-2022-4904, CVE-2022-35255, CVE-2023-32002, CVE-2024-21892, CVE-2024-21896, CVE-2025-23083, CVE-2025-6965, CVE-2021-35065, CVE-2022-25881, CVE-2022-25883, CVE-2022-3517, CVE-2022-43548, CVE-2023-23918, CVE-2023-23919, CVE-2023-24807, CVE-2023-30581, CVE-2023-30590, CVE-2023-32067, CVE-2023-32559, CVE-2023-38552, CVE-2023-39331, CVE-2023-44487, CVE-2024-22019, CVE-2024-27983, CVE-2025-23166, CVE-2025-59465, CVE-2026-1526, CVE-2026-1528, CVE-2026-21710, CVE-2026-2229, CVE-2026-27135, CVE-2024-22017, CVE-2025-3277, CVE-2026-1525, CVE-2025-55130, CVE-2025-55131, CVE-2023-30589, CVE-2025-31498), pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2023-5363, CVE-2026-28390, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/nodejs-libs@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2023-32006, CVE-2022-4904, CVE-2023-32002, CVE-2025-23083, CVE-2025-6965, CVE-2022-25881, CVE-2023-24807, CVE-2023-30581, CVE-2023-30590, CVE-2023-32067, CVE-2023-32559, CVE-2023-44487, CVE-2024-22019, CVE-2024-27983, CVE-2025-23166, CVE-2025-59465, CVE-2026-1526, CVE-2026-1528, CVE-2026-21710, CVE-2026-2229, CVE-2026-27135, CVE-2025-3277, CVE-2026-1525, CVE-2025-55130, CVE-2025-55131, CVE-2023-30589, CVE-2025-31498), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libbrotli@1.0.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=brotli-1.0.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2025-6176), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-decorator@4.4.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-decorator-4.4.2-6.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm [transitive via pkg:rpm/redhat/python3-decorator@4.4.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-decorator-4.4.2-6.el9.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-decorator@4.4.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-decorator-4.4.2-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-decorator@4.4.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-decorator-4.4.2-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-decorator@4.4.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-decorator-4.4.2-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-decorator@4.4.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-decorator-4.4.2-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-decorator@4.4.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-decorator-4.4.2-6.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-decorator@4.4.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-decorator-4.4.2-6.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-decorator@4.4.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-decorator-4.4.2-6.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-decorator@4.4.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-decorator-4.4.2-6.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-decorator@4.4.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-decorator-4.4.2-6.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-decorator@4.4.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-decorator-4.4.2-6.el9.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-decorator@4.4.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-decorator-4.4.2-6.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-decorator@4.4.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-decorator-4.4.2-6.el9.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=environment-modules-5.0.1-2.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=environment-modules-5.0.1-2.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=environment-modules-5.0.1-2.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=environment-modules-5.0.1-2.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=environment-modules-5.0.1-2.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/less@590-1.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=less-590-1.el9_0.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=environment-modules-5.0.1-2.el9.src.rpm] (CVE-2024-32487, CVE-2022-46663, CVE-2022-48624), pkg:rpm/redhat/vim-filesystem@8.2.2637-20.el9_1?arch=noarch\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=vim-8.2.2637-20.el9_1.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=environment-modules-5.0.1-2.el9.src.rpm] (CVE-2026-34982, CVE-2026-25749, CVE-2026-33412, CVE-2023-4752), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=environment-modules-5.0.1-2.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=environment-modules-5.0.1-2.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=environment-modules-5.0.1-2.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=environment-modules-5.0.1-2.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=environment-modules-5.0.1-2.el9.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-0553, CVE-2024-0567), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/libicu@67.1-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=icu-67.1-9.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2025-5222), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/libcomps@0.1.18-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcomps-0.1.18-1.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2026-1312, CVE-2026-0980, CVE-2026-1207, CVE-2026-1287, CVE-2026-1530, CVE-2026-1531, CVE-2026-1961, CVE-2021-46877, CVE-2025-14550, CVE-2025-6176, CVE-2026-1285, CVE-2025-68121), pkg:rpm/redhat/python3-libcomps@0.1.18-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcomps-0.1.18-1.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2026-1312, CVE-2026-0980, CVE-2026-1207, CVE-2026-1287, CVE-2026-1530, CVE-2026-1531, CVE-2026-1961, CVE-2021-46877, CVE-2025-14550, CVE-2025-6176, CVE-2026-1285, CVE-2025-68121), pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2026-24882, CVE-2025-68973), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2025-5914, CVE-2026-4111, CVE-2026-4424, CVE-2026-5121), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2024-0553, CVE-2024-0567), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openldap@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-devel@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-devel@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-devel@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-devel@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-devel@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm [transitive via pkg:rpm/redhat/python3-devel@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-devel@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-devel@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-devel@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-devel@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-devel@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-devel@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-devel@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-devel@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-systemd@234-18.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-systemd-234-18.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-systemd@234-18.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-systemd-234-18.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-systemd@234-18.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-systemd-234-18.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-systemd@234-18.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-systemd-234-18.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-systemd@234-18.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-systemd-234-18.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm [transitive via pkg:rpm/redhat/python3-systemd@234-18.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-systemd-234-18.el9.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-systemd@234-18.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-systemd-234-18.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-systemd@234-18.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-systemd-234-18.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-systemd@234-18.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-systemd-234-18.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-systemd@234-18.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-systemd-234-18.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-systemd@234-18.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-systemd-234-18.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-systemd@234-18.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-systemd-234-18.el9.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-systemd@234-18.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-systemd-234-18.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-systemd@234-18.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-systemd-234-18.el9.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-systemd@234-18.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-systemd-234-18.el9.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-27522, CVE-2023-31122, CVE-2024-38477, CVE-2024-47252, CVE-2025-23048, CVE-2025-49812, CVE-2024-39573, CVE-2025-58098), pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-27522, CVE-2023-31122, CVE-2024-38477, CVE-2024-47252, CVE-2025-23048, CVE-2025-49812, CVE-2024-39573, CVE-2025-58098), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/httpd-filesystem@2.4.53-11.el9_2.5?arch=noarch\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-27522, CVE-2023-31122, CVE-2024-38477, CVE-2024-47252, CVE-2025-23048, CVE-2025-49812, CVE-2025-59775, CVE-2024-39573, CVE-2025-58098), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2023-5363, CVE-2026-28390, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/openssh@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2026-3497, CVE-2024-6387, CVE-2026-35385, CVE-2023-51767, CVE-2024-6409), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/pam@1.5.1-14.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pam-1.5.1-14.el9.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2025-6020, CVE-2025-8941, CVE-2024-10963), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2026-24882, CVE-2025-68973), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2025-5914, CVE-2026-4111, CVE-2026-4424, CVE-2026-5121), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2024-0553, CVE-2024-0567), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openldap@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-27522, CVE-2023-31122, CVE-2024-38477, CVE-2024-47252, CVE-2025-23048, CVE-2025-49812, CVE-2024-39573, CVE-2025-58098), pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-27522, CVE-2023-31122, CVE-2024-38477, CVE-2024-47252, CVE-2025-23048, CVE-2025-49812, CVE-2024-39573, CVE-2025-58098), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/httpd-filesystem@2.4.53-11.el9_2.5?arch=noarch\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-27522, CVE-2023-31122, CVE-2024-38477, CVE-2024-47252, CVE-2025-23048, CVE-2025-49812, CVE-2025-59775, CVE-2024-39573, CVE-2025-58098), pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-5363, CVE-2026-28390, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/pam@1.5.1-14.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pam-1.5.1-14.el9.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-6020, CVE-2025-8941, CVE-2024-10963), pkg:rpm/redhat/systemd@252-13.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-13.el9_2.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2026-29111), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/libbrotli@1.0.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=brotli-1.0.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-6176), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/less@590-1.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=less-590-1.el9_0.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2024-32487, CVE-2022-46663, CVE-2022-48624), pkg:rpm/redhat/vim-filesystem@8.2.2637-20.el9_1?arch=noarch\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=vim-8.2.2637-20.el9_1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2026-34982, CVE-2026-25749, CVE-2026-33412, CVE-2023-4752), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2025-5914, CVE-2026-4111, CVE-2026-4424, CVE-2026-5121), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/libcomps@0.1.18-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcomps-0.1.18-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2026-1312, CVE-2026-0980, CVE-2026-1207, CVE-2026-1287, CVE-2026-1530, CVE-2026-1531, CVE-2026-1961, CVE-2021-46877, CVE-2025-14550, CVE-2025-6176, CVE-2026-1285, CVE-2025-68121), pkg:rpm/redhat/python3-libcomps@0.1.18-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcomps-0.1.18-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2026-1312, CVE-2026-0980, CVE-2026-1207, CVE-2026-1287, CVE-2026-1530, CVE-2026-1531, CVE-2026-1961, CVE-2021-46877, CVE-2025-14550, CVE-2025-6176, CVE-2026-1285, CVE-2025-68121), pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2026-24882, CVE-2025-68973), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2025-5914, CVE-2026-4111, CVE-2026-4424, CVE-2026-5121), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2024-0553, CVE-2024-0567), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openldap@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2026-24882, CVE-2025-68973), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/python3-cloud-what@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-3899), pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2025-5914, CVE-2026-4111, CVE-2026-4424, CVE-2026-5121), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-0553, CVE-2024-0567), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openldap@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/dmidecode@3.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dmidecode-3.3-7.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-30630), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-devel@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-headers@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2024-2961, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/kernel-headers@5.14.0-284.11.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=kernel-5.14.0-284.11.1.el9_2.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-44466, CVE-2024-5154, CVE-2025-21927, CVE-2023-1652, CVE-2023-52922, CVE-2024-36971, CVE-2025-21756, CVE-2025-22020, CVE-2025-38052, CVE-2025-38087, CVE-2022-41723, CVE-2025-38471, CVE-2024-42284, CVE-2024-53104, CVE-2025-37750, CVE-2025-38250, CVE-2022-49846, CVE-2023-52933, CVE-2023-53751, CVE-2023-6606, CVE-2023-6610, CVE-2024-35937, CVE-2024-38538, CVE-2024-53150, CVE-2024-57947, CVE-2025-21887, CVE-2025-21893, CVE-2025-21920, CVE-2025-21969, CVE-2025-21979, CVE-2025-21993, CVE-2025-21997, CVE-2025-22026, CVE-2025-22055, CVE-2025-22058, CVE-2025-22104, CVE-2025-22113, CVE-2025-22121, CVE-2025-37738, CVE-2025-37799, CVE-2025-38264, CVE-2022-49977, CVE-2022-50066, CVE-2023-53047, CVE-2023-53107, CVE-2023-6932, CVE-2024-0646, CVE-2024-46858, CVE-2024-50154, CVE-2024-53141, CVE-2025-21727, CVE-2025-21764, CVE-2025-21867, CVE-2025-21919, CVE-2025-21926, CVE-2025-21966, CVE-2025-22004, CVE-2025-22126, CVE-2025-37797, CVE-2025-37803, CVE-2025-37890, CVE-2025-37914, CVE-2025-37943, CVE-2025-38079, CVE-2025-38086, CVE-2025-38124, CVE-2025-38177, CVE-2025-38200, CVE-2025-38332), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/libtiff-devel@4.4.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtiff-4.4.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-9900, CVE-2025-8176, CVE-2026-4775, CVE-2017-17095, CVE-2023-52355, CVE-2023-52356, CVE-2024-7006), pkg:rpm/redhat/graphite2@1.3.14-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=graphite2-1.3.14-9.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2017-5436), pkg:rpm/redhat/libtiff@4.4.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtiff-4.4.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-9900, CVE-2025-8176, CVE-2026-4775, CVE-2017-17095, CVE-2023-52355, CVE-2023-52356, CVE-2024-7006), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/freetype@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-27363), pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-27363), pkg:rpm/redhat/libX11-common@1.7.0-7.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-43787, CVE-2023-3138), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libX11-xcb@1.7.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-43787, CVE-2023-3138), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libX11-devel@1.7.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-43787, CVE-2023-3138), pkg:rpm/redhat/libX11@1.7.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-43787, CVE-2023-3138), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/glib2-devel@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/libpng@1.6.37-12.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=libpng-1.6.37-12.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2026-33636, CVE-2026-33416, CVE-2025-64720, CVE-2025-65018, CVE-2025-66293, CVE-2026-25646), pkg:rpm/redhat/brotli-devel@1.0.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=brotli-1.0.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-6176), pkg:rpm/redhat/brotli@1.0.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=brotli-1.0.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-6176), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/harfbuzz-devel@2.7.4-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=harfbuzz-2.7.4-8.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-25193), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-0553, CVE-2024-0567), pkg:rpm/redhat/libbrotli@1.0.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=brotli-1.0.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-6176), pkg:rpm/redhat/xz-devel@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/harfbuzz-icu@2.7.4-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=harfbuzz-2.7.4-8.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-25193), pkg:rpm/redhat/harfbuzz@2.7.4-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=harfbuzz-2.7.4-8.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-25193), pkg:rpm/redhat/libjpeg-turbo-devel@2.0.90-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libjpeg-turbo-2.0.90-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2021-29390), pkg:rpm/redhat/libpng-devel@1.6.37-12.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=libpng-1.6.37-12.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-64720, CVE-2025-65018, CVE-2025-66293, CVE-2026-25646), pkg:rpm/redhat/libjpeg-turbo@2.0.90-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libjpeg-turbo-2.0.90-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2021-29390), pkg:rpm/redhat/libicu-devel@67.1-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=icu-67.1-9.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-5222), pkg:rpm/redhat/libicu@67.1-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=icu-67.1-9.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-5222), pkg:rpm/redhat/pixman@0.40.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pixman-0.40.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2022-44638), pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2026-3497, CVE-2024-6387, CVE-2026-35385, CVE-2024-6409), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2023-5363, CVE-2026-28390, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/openssh@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2026-3497, CVE-2024-6387, CVE-2026-35385, CVE-2023-51767, CVE-2024-6409), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370), pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-48385, CVE-2024-32004, CVE-2025-48384, CVE-2024-52005, CVE-2024-32465), pkg:rpm/redhat/git-core@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-48385, CVE-2024-32004, CVE-2025-48384, CVE-2024-52005, CVE-2024-32465), pkg:rpm/redhat/perl-Git@2.39.3-1.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-48385, CVE-2024-32004, CVE-2025-48384, CVE-2024-52005, CVE-2024-32465), pkg:rpm/redhat/git-core-doc@2.39.3-1.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-48385, CVE-2024-32004, CVE-2025-48384, CVE-2024-52005, CVE-2024-32465), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/emacs-filesystem@27.2-8.el9_2.1?arch=noarch\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=emacs-27.2-8.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-1244, CVE-2024-30205, CVE-2024-39331, CVE-2024-53920), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/less@590-1.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=less-590-1.el9_0.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2024-32487, CVE-2022-46663, CVE-2022-48624), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2023-31486, CVE-2023-47038), pkg:rpm/redhat/pam@1.5.1-14.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pam-1.5.1-14.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-6020, CVE-2025-8941, CVE-2024-10963), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/perl-mro@1.23-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Class-Struct@0.66-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-subs@1.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-interpreter@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overload@1.31-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-libs@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-lib@0.65-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-stat@1.09-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IO@1.43-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-Find@1.37-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-Basename@2.85-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-POSIX@1.94-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Symbol@1.08-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-SelectSaver@1.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Getopt-Std@1.12-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-vars@1.05-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-if@0.60.800-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Fcntl@1.13-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-DynaLoader@1.47-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IPC-Open3@1.21-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overloading@0.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Errno@1.30-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2023-47038), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-pip@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pip@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pip@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pip@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pip@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pip@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pip@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pip@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pip@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pip@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pip@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-pip@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-pip@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pip@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-devel@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-headers@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2024-2961, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/kernel-headers@5.14.0-284.11.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=kernel-5.14.0-284.11.1.el9_2.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-44466, CVE-2024-5154, CVE-2025-21927, CVE-2023-1652, CVE-2023-52922, CVE-2024-36971, CVE-2025-21756, CVE-2025-22020, CVE-2025-38052, CVE-2025-38087, CVE-2022-41723, CVE-2025-38471, CVE-2024-42284, CVE-2024-53104, CVE-2025-37750, CVE-2025-38250, CVE-2022-49846, CVE-2023-52933, CVE-2023-53751, CVE-2023-6606, CVE-2023-6610, CVE-2024-35937, CVE-2024-38538, CVE-2024-53150, CVE-2024-57947, CVE-2025-21887, CVE-2025-21893, CVE-2025-21920, CVE-2025-21969, CVE-2025-21979, CVE-2025-21993, CVE-2025-21997, CVE-2025-22026, CVE-2025-22055, CVE-2025-22058, CVE-2025-22104, CVE-2025-22113, CVE-2025-22121, CVE-2025-37738, CVE-2025-37799, CVE-2025-38264, CVE-2022-49977, CVE-2022-50066, CVE-2023-53047, CVE-2023-53107, CVE-2023-6932, CVE-2024-0646, CVE-2024-46858, CVE-2024-50154, CVE-2024-53141, CVE-2025-21727, CVE-2025-21764, CVE-2025-21867, CVE-2025-21919, CVE-2025-21926, CVE-2025-21966, CVE-2025-22004, CVE-2025-22126, CVE-2025-37797, CVE-2025-37803, CVE-2025-37890, CVE-2025-37914, CVE-2025-37943, CVE-2025-38079, CVE-2025-38086, CVE-2025-38124, CVE-2025-38177, CVE-2025-38200, CVE-2025-38332), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-0553, CVE-2024-0567), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/libicu@67.1-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=icu-67.1-9.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2025-5222), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2023-5363, CVE-2026-28390, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/pam@1.5.1-14.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pam-1.5.1-14.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2025-6020, CVE-2025-8941, CVE-2024-10963), pkg:rpm/redhat/systemd@252-13.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-13.el9_2.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2026-29111), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/openldap@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.15-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-ethtool-0.15-2.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.15-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-ethtool-0.15-2.el9.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.15-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-ethtool-0.15-2.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.15-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-ethtool-0.15-2.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.15-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-ethtool-0.15-2.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.15-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-ethtool-0.15-2.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.15-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-ethtool-0.15-2.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.15-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-ethtool-0.15-2.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.15-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-ethtool-0.15-2.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.15-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-ethtool-0.15-2.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.15-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-ethtool-0.15-2.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.15-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-ethtool-0.15-2.el9.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.15-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-ethtool-0.15-2.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.15-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-ethtool-0.15-2.el9.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/libkadm5@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/libkadm5@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libkadm5@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libkadm5@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libkadm5@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libkadm5@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libkadm5@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/libkadm5@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libkadm5@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/libcomps@0.1.18-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcomps-0.1.18-1.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2026-1312, CVE-2026-0980, CVE-2026-1207, CVE-2026-1287, CVE-2026-1530, CVE-2026-1531, CVE-2026-1961, CVE-2021-46877, CVE-2025-14550, CVE-2025-6176, CVE-2026-1285, CVE-2025-68121), pkg:rpm/redhat/python3-libcomps@0.1.18-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcomps-0.1.18-1.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2026-1312, CVE-2026-0980, CVE-2026-1207, CVE-2026-1287, CVE-2026-1530, CVE-2026-1531, CVE-2026-1961, CVE-2021-46877, CVE-2025-14550, CVE-2025-6176, CVE-2026-1285, CVE-2025-68121), pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2026-24882, CVE-2025-68973), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2025-5914, CVE-2026-4111, CVE-2026-4424, CVE-2026-5121), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2024-0553, CVE-2024-0567), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openldap@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-27522, CVE-2023-31122, CVE-2024-38477, CVE-2024-47252, CVE-2025-23048, CVE-2025-49812, CVE-2024-39573, CVE-2025-58098), pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-27522, CVE-2023-31122, CVE-2024-38477, CVE-2024-47252, CVE-2025-23048, CVE-2025-49812, CVE-2024-39573, CVE-2025-58098), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/httpd-filesystem@2.4.53-11.el9_2.5?arch=noarch\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-27522, CVE-2023-31122, CVE-2024-38477, CVE-2024-47252, CVE-2025-23048, CVE-2025-49812, CVE-2025-59775, CVE-2024-39573, CVE-2025-58098), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/libpq@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpq-13.5-1.el9.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2025-1094, CVE-2025-12818), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openldap@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/sscg@3.0.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sscg-3.0.0-7.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/sscg@3.0.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sscg-3.0.0-7.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/sscg@3.0.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sscg-3.0.0-7.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/sscg@3.0.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sscg-3.0.0-7.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/sscg@3.0.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sscg-3.0.0-7.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/sscg@3.0.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sscg-3.0.0-7.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/sscg@3.0.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sscg-3.0.0-7.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/sscg@3.0.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sscg-3.0.0-7.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/krb5-devel@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libkadm5@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/krb5-devel@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/krb5-devel@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/krb5-devel@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/krb5-devel@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/krb5-devel@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/krb5-devel@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/krb5-devel@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/krb5-devel@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/krb5-devel@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-inotify@0.9.6-25.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-inotify-0.9.6-25.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm [transitive via pkg:rpm/redhat/python3-inotify@0.9.6-25.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-inotify-0.9.6-25.el9.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-inotify@0.9.6-25.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-inotify-0.9.6-25.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-inotify@0.9.6-25.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-inotify-0.9.6-25.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-inotify@0.9.6-25.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-inotify-0.9.6-25.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-inotify@0.9.6-25.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-inotify-0.9.6-25.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm [transitive via pkg:rpm/redhat/python3-inotify@0.9.6-25.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-inotify-0.9.6-25.el9.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-inotify@0.9.6-25.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-inotify-0.9.6-25.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-inotify@0.9.6-25.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-inotify-0.9.6-25.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-inotify@0.9.6-25.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-inotify-0.9.6-25.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-inotify@0.9.6-25.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-inotify-0.9.6-25.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-inotify@0.9.6-25.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-inotify-0.9.6-25.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-inotify@0.9.6-25.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-inotify-0.9.6-25.el9.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-inotify@0.9.6-25.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-inotify-0.9.6-25.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-inotify@0.9.6-25.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-inotify-0.9.6-25.el9.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/libcomps@0.1.18-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcomps-0.1.18-1.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2026-1312, CVE-2026-0980, CVE-2026-1207, CVE-2026-1287, CVE-2026-1530, CVE-2026-1531, CVE-2026-1961, CVE-2021-46877, CVE-2025-14550, CVE-2025-6176, CVE-2026-1285, CVE-2025-68121), pkg:rpm/redhat/python3-libcomps@0.1.18-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcomps-0.1.18-1.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2026-1312, CVE-2026-0980, CVE-2026-1207, CVE-2026-1287, CVE-2026-1530, CVE-2026-1531, CVE-2026-1961, CVE-2021-46877, CVE-2025-14550, CVE-2025-6176, CVE-2026-1285, CVE-2025-68121), pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2026-24882, CVE-2025-68973), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2025-5914, CVE-2026-4111, CVE-2026-4424, CVE-2026-5121), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-0553, CVE-2024-0567), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openldap@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-5363, CVE-2026-28390, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/libcomps@0.1.18-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcomps-0.1.18-1.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2026-1312, CVE-2026-0980, CVE-2026-1207, CVE-2026-1287, CVE-2026-1530, CVE-2026-1531, CVE-2026-1961, CVE-2021-46877, CVE-2025-14550, CVE-2025-6176, CVE-2026-1285, CVE-2025-68121), pkg:rpm/redhat/python3-libcomps@0.1.18-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcomps-0.1.18-1.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2026-1312, CVE-2026-0980, CVE-2026-1207, CVE-2026-1287, CVE-2026-1530, CVE-2026-1531, CVE-2026-1961, CVE-2021-46877, CVE-2025-14550, CVE-2025-6176, CVE-2026-1285, CVE-2025-68121), pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2026-24882, CVE-2025-68973), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/pam@1.5.1-14.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pam-1.5.1-14.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2025-6020, CVE-2025-8941, CVE-2024-10963), pkg:rpm/redhat/systemd@252-13.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-13.el9_2.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2026-29111), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-3899), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/python3-cloud-what@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-3899), pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2025-5914, CVE-2026-4111, CVE-2026-4424, CVE-2026-5121), pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-3899), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-0553, CVE-2024-0567), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openldap@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/dmidecode@3.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dmidecode-3.3-7.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-30630), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/graphite2@1.3.14-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=graphite2-1.3.14-9.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2017-5436), pkg:rpm/redhat/libtiff@4.4.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtiff-4.4.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-9900, CVE-2025-8176, CVE-2026-4775, CVE-2017-17095, CVE-2023-52355, CVE-2023-52356, CVE-2024-7006), pkg:rpm/redhat/freetype@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-27363), pkg:rpm/redhat/libX11-common@1.7.0-7.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-43787, CVE-2023-3138), pkg:rpm/redhat/libX11@1.7.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-43787, CVE-2023-3138), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/libpng@1.6.37-12.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=libpng-1.6.37-12.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2026-33636, CVE-2026-33416, CVE-2025-64720, CVE-2025-65018, CVE-2025-66293, CVE-2026-25646), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-0553, CVE-2024-0567), pkg:rpm/redhat/libbrotli@1.0.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=brotli-1.0.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-6176), pkg:rpm/redhat/harfbuzz@2.7.4-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=harfbuzz-2.7.4-8.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-25193), pkg:rpm/redhat/libjpeg-turbo@2.0.90-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libjpeg-turbo-2.0.90-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2021-29390), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libxslt@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxslt-1.1.34-9.el9.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2024-55549, CVE-2025-24855, CVE-2025-7425, CVE-2025-7424), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/xz-devel@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2023-31486, CVE-2023-47038), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/perl-POSIX@1.94-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Symbol@1.08-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-mro@1.23-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-SelectSaver@1.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Getopt-Std@1.12-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Class-Struct@0.66-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-subs@1.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-vars@1.05-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-interpreter@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overload@1.31-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-libs@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-if@0.60.800-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-stat@1.09-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Fcntl@1.13-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IO@1.43-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-Basename@2.85-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IPC-Open3@1.21-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overloading@0.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Errno@1.30-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2023-47038), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/xml-common@0.6.3-58.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=sgml-common-0.6.3-58.el9.src.rpm] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/xml-common@0.6.3-58.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=sgml-common-0.6.3-58.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/xml-common@0.6.3-58.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=sgml-common-0.6.3-58.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/xml-common@0.6.3-58.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=sgml-common-0.6.3-58.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/xml-common@0.6.3-58.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=sgml-common-0.6.3-58.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/xml-common@0.6.3-58.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=sgml-common-0.6.3-58.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/xml-common@0.6.3-58.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=sgml-common-0.6.3-58.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/xml-common@0.6.3-58.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=sgml-common-0.6.3-58.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/xz-devel@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/json-c@0.14-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-c-0.14-11.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/json-c@0.14-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-c-0.14-11.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/json-c@0.14-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-c-0.14-11.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/json-c@0.14-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-c-0.14-11.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/json-c@0.14-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-c-0.14-11.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/json-c@0.14-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-c-0.14-11.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/sqlite@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/sqlite@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/sqlite@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/sqlite@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/sqlite@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/sqlite@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/sqlite@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/atlas-devel@3.10.3-17.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=atlas-3.10.3-17.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/atlas-devel@3.10.3-17.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=atlas-3.10.3-17.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/atlas-devel@3.10.3-17.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=atlas-3.10.3-17.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/atlas-devel@3.10.3-17.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=atlas-3.10.3-17.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/atlas-devel@3.10.3-17.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=atlas-3.10.3-17.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/atlas-devel@3.10.3-17.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=atlas-3.10.3-17.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libicu-devel@67.1-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=icu-67.1-9.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libicu-devel@67.1-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=icu-67.1-9.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libicu-devel@67.1-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=icu-67.1-9.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libicu-devel@67.1-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=icu-67.1-9.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libicu-devel@67.1-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=icu-67.1-9.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libicu-devel@67.1-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=icu-67.1-9.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libicu@67.1-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=icu-67.1-9.el9.src.rpm [transitive via pkg:rpm/redhat/libicu-devel@67.1-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=icu-67.1-9.el9.src.rpm] (CVE-2025-5222), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-locale-source@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-locale-source@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-locale-source@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-locale-source@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-locale-source@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-locale-source@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2023-31486, CVE-2023-47038), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/perl-POSIX@1.94-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Symbol@1.08-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-mro@1.23-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-SelectSaver@1.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Getopt-Std@1.12-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Class-Struct@0.66-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-subs@1.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-vars@1.05-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-interpreter@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overload@1.31-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-libs@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-if@0.60.800-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-stat@1.09-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Fcntl@1.13-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IO@1.43-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-Basename@2.85-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-base@2.27-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IPC-Open3@1.21-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Errno@1.30-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overloading@0.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2023-47038), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/hunspell-en-US@0.20140811.1-20.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=hunspell-en-0.20140811.1-20.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/hunspell-en-US@0.20140811.1-20.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=hunspell-en-0.20140811.1-20.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/hunspell-en-US@0.20140811.1-20.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=hunspell-en-0.20140811.1-20.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/hunspell-en-US@0.20140811.1-20.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=hunspell-en-0.20140811.1-20.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/hunspell-en-US@0.20140811.1-20.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=hunspell-en-0.20140811.1-20.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/hunspell-en-US@0.20140811.1-20.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=hunspell-en-0.20140811.1-20.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/pcre-cpp@8.44-3.el9.3?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pcre-8.44-3.el9.3.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/pcre-cpp@8.44-3.el9.3?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pcre-8.44-3.el9.3.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/pcre-cpp@8.44-3.el9.3?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pcre-8.44-3.el9.3.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/pcre-cpp@8.44-3.el9.3?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pcre-8.44-3.el9.3.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/pcre-cpp@8.44-3.el9.3?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pcre-8.44-3.el9.3.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/pcre-cpp@8.44-3.el9.3?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pcre-8.44-3.el9.3.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2023-31486, CVE-2023-47038), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/perl-POSIX@1.94-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Symbol@1.08-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-mro@1.23-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-SelectSaver@1.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Getopt-Std@1.12-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Class-Struct@0.66-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-subs@1.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-vars@1.05-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-interpreter@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overload@1.31-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-libs@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-if@0.60.800-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-stat@1.09-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Fcntl@1.13-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IO@1.43-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-Basename@2.85-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IPC-Open3@1.21-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Errno@1.30-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overloading@0.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2023-47038), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/apr-devel@1.7.0-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-1.7.0-11.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/apr-devel@1.7.0-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-1.7.0-11.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/apr-devel@1.7.0-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-1.7.0-11.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/apr-devel@1.7.0-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-1.7.0-11.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/apr-devel@1.7.0-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-1.7.0-11.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/apr-devel@1.7.0-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-1.7.0-11.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libstdc%2B%2B-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libstdc%2B%2B-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libstdc%2B%2B-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libstdc%2B%2B-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libstdc%2B%2B-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libstdc%2B%2B-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/xz@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/xz@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/xz@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/xz@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/xz@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/xz@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/xz@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper-libs@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper-libs@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper-libs@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper-libs@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper-libs@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper-libs@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2023-31486, CVE-2023-47038), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/perl-POSIX@1.94-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Symbol@1.08-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-mro@1.23-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-SelectSaver@1.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Getopt-Std@1.12-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Class-Struct@0.66-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-subs@1.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-vars@1.05-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-interpreter@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overload@1.31-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-libs@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-if@0.60.800-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-stat@1.09-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Fcntl@1.13-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IO@1.43-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-Basename@2.85-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IPC-Open3@1.21-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Errno@1.30-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overloading@0.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2023-47038), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/emacs-filesystem@27.2-8.el9_2.1?arch=noarch\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=emacs-27.2-8.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-1244, CVE-2024-30205, CVE-2024-39331, CVE-2024-53920), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2023-31486, CVE-2023-47038), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/perl-POSIX@1.94-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Symbol@1.08-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-mro@1.23-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-SelectSaver@1.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Getopt-Std@1.12-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Class-Struct@0.66-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-subs@1.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-Compare@1.100.600-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-vars@1.05-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-interpreter@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overload@1.31-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-libs@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-B@1.80-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-if@0.60.800-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-stat@1.09-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Fcntl@1.13-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IO@1.43-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-Find@1.37-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-Basename@2.85-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-DynaLoader@1.47-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IPC-Open3@1.21-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Errno@1.30-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overloading@0.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2023-47038), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libdb-devel@5.3.28-53.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdb-5.3.28-53.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libdb-devel@5.3.28-53.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdb-5.3.28-53.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libdb-devel@5.3.28-53.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdb-5.3.28-53.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libdb-devel@5.3.28-53.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdb-5.3.28-53.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libdb-devel@5.3.28-53.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdb-5.3.28-53.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libdb-devel@5.3.28-53.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdb-5.3.28-53.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/file@5.39-12.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=file-5.39-12.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/file@5.39-12.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=file-5.39-12.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/file@5.39-12.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=file-5.39-12.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/file@5.39-12.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=file-5.39-12.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/file@5.39-12.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=file-5.39-12.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/file@5.39-12.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=file-5.39-12.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libverto-devel@0.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libverto-0.3.2-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libverto-devel@0.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libverto-0.3.2-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libverto-devel@0.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libverto-0.3.2-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libverto-devel@0.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libverto-0.3.2-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libverto-devel@0.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libverto-0.3.2-3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libverto-devel@0.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libverto-0.3.2-3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/patch@2.7.6-16.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=patch-2.7.6-16.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/patch@2.7.6-16.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=patch-2.7.6-16.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/patch@2.7.6-16.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=patch-2.7.6-16.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/patch@2.7.6-16.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=patch-2.7.6-16.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/patch@2.7.6-16.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=patch-2.7.6-16.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/patch@2.7.6-16.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=patch-2.7.6-16.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-headers@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-headers@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-headers@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-headers@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-headers@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-headers@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/wget@1.21.1-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=wget-1.21.1-7.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/wget@1.21.1-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=wget-1.21.1-7.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/wget@1.21.1-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=wget-1.21.1-7.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/wget@1.21.1-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=wget-1.21.1-7.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/wget@1.21.1-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=wget-1.21.1-7.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/wget@1.21.1-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=wget-1.21.1-7.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/wget@1.21.1-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=wget-1.21.1-7.el9.src.rpm] (CVE-2024-0553, CVE-2024-0567), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2023-31486, CVE-2023-47038), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/perl-POSIX@1.94-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Symbol@1.08-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-mro@1.23-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-SelectSaver@1.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Getopt-Std@1.12-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Class-Struct@0.66-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-subs@1.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-vars@1.05-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-interpreter@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overload@1.31-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-libs@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-if@0.60.800-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-stat@1.09-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Fcntl@1.13-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IO@1.43-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-Basename@2.85-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IPC-Open3@1.21-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overloading@0.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Errno@1.30-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2023-47038), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/bzip2@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/bzip2@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/bzip2@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/bzip2@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/bzip2@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/bzip2@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libgpg-error-devel@1.42-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgpg-error-1.42-5.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libgpg-error-devel@1.42-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgpg-error-1.42-5.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libgpg-error-devel@1.42-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgpg-error-1.42-5.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libgpg-error-devel@1.42-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgpg-error-1.42-5.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libgpg-error-devel@1.42-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgpg-error-1.42-5.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libgpg-error-devel@1.42-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgpg-error-1.42-5.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libpsl@0.21.1-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpsl-0.21.1-5.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libpsl@0.21.1-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpsl-0.21.1-5.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libpsl@0.21.1-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpsl-0.21.1-5.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libpsl@0.21.1-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpsl-0.21.1-5.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libpsl@0.21.1-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpsl-0.21.1-5.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libpsl@0.21.1-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpsl-0.21.1-5.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libtool-ltdl@2.4.6-45.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtool-2.4.6-45.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libtool-ltdl@2.4.6-45.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtool-2.4.6-45.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libtool-ltdl@2.4.6-45.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtool-2.4.6-45.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libtool-ltdl@2.4.6-45.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtool-2.4.6-45.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libtool-ltdl@2.4.6-45.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtool-2.4.6-45.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libtool-ltdl@2.4.6-45.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtool-2.4.6-45.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2023-31486, CVE-2023-47038), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/perl-POSIX@1.94-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Symbol@1.08-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-mro@1.23-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-SelectSaver@1.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Getopt-Std@1.12-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Class-Struct@0.66-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-subs@1.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-vars@1.05-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-interpreter@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overload@1.31-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-libs@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-if@0.60.800-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-stat@1.09-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Fcntl@1.13-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IO@1.43-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-Basename@2.85-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IPC-Open3@1.21-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Errno@1.30-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overloading@0.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2023-47038), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2023-31486, CVE-2023-47038), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/perl-POSIX@1.94-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Symbol@1.08-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-mro@1.23-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-SelectSaver@1.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Getopt-Std@1.12-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Class-Struct@0.66-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-subs@1.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-vars@1.05-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-interpreter@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overload@1.31-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-libs@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-if@0.60.800-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-stat@1.09-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Fcntl@1.13-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IO@1.43-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-Basename@2.85-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IPC-Open3@1.21-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Errno@1.30-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overloading@0.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2023-47038), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-gdbserver@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-gdbserver@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-gdbserver@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-gdbserver@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-gdbserver@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-gdbserver@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libipt@2.0.4-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libipt-2.0.4-5.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libipt@2.0.4-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libipt-2.0.4-5.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libipt@2.0.4-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libipt-2.0.4-5.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libipt@2.0.4-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libipt-2.0.4-5.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libipt@2.0.4-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libipt-2.0.4-5.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libipt@2.0.4-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libipt-2.0.4-5.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libcom_err-devel@1.46.5-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=e2fsprogs-1.46.5-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libcom_err-devel@1.46.5-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=e2fsprogs-1.46.5-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libcom_err-devel@1.46.5-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=e2fsprogs-1.46.5-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libcom_err-devel@1.46.5-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=e2fsprogs-1.46.5-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libcom_err-devel@1.46.5-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=e2fsprogs-1.46.5-3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libcom_err-devel@1.46.5-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=e2fsprogs-1.46.5-3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libxcrypt-compat@4.4.18-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxcrypt-4.4.18-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libxcrypt-compat@4.4.18-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxcrypt-4.4.18-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libxcrypt-compat@4.4.18-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxcrypt-4.4.18-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libxcrypt-compat@4.4.18-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxcrypt-4.4.18-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libxcrypt-compat@4.4.18-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxcrypt-4.4.18-3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libxcrypt-compat@4.4.18-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxcrypt-4.4.18-3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libpath_utils@0.2.1-53.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ding-libs-0.6.1-53.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libpath_utils@0.2.1-53.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ding-libs-0.6.1-53.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libpath_utils@0.2.1-53.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ding-libs-0.6.1-53.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libpath_utils@0.2.1-53.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ding-libs-0.6.1-53.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libpath_utils@0.2.1-53.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ding-libs-0.6.1-53.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libpath_utils@0.2.1-53.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ding-libs-0.6.1-53.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/boost-regex@1.75.0-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=boost-1.75.0-8.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/boost-regex@1.75.0-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=boost-1.75.0-8.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/boost-regex@1.75.0-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=boost-1.75.0-8.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/boost-regex@1.75.0-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=boost-1.75.0-8.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/boost-regex@1.75.0-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=boost-1.75.0-8.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/boost-regex@1.75.0-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=boost-1.75.0-8.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libicu@67.1-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=icu-67.1-9.el9.src.rpm [transitive via pkg:rpm/redhat/boost-regex@1.75.0-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=boost-1.75.0-8.el9.src.rpm] (CVE-2025-5222), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/xorg-x11-proto-devel@2021.4-2.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=xorg-x11-proto-devel-2021.4-2.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/xorg-x11-proto-devel@2021.4-2.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=xorg-x11-proto-devel-2021.4-2.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/xorg-x11-proto-devel@2021.4-2.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=xorg-x11-proto-devel-2021.4-2.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/xorg-x11-proto-devel@2021.4-2.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=xorg-x11-proto-devel-2021.4-2.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/xorg-x11-proto-devel@2021.4-2.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=xorg-x11-proto-devel-2021.4-2.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/xorg-x11-proto-devel@2021.4-2.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=xorg-x11-proto-devel-2021.4-2.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libtalloc@2.3.4-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtalloc-2.3.4-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libtalloc@2.3.4-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtalloc-2.3.4-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libtalloc@2.3.4-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtalloc-2.3.4-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libtalloc@2.3.4-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtalloc-2.3.4-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libtalloc@2.3.4-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtalloc-2.3.4-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libtalloc@2.3.4-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtalloc-2.3.4-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/m4@1.4.19-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=m4-1.4.19-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/m4@1.4.19-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=m4-1.4.19-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/m4@1.4.19-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=m4-1.4.19-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/m4@1.4.19-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=m4-1.4.19-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/m4@1.4.19-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=m4-1.4.19-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/m4@1.4.19-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=m4-1.4.19-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/libX11-devel@1.7.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2023-43787, CVE-2023-3138), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libX11-xcb@1.7.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2023-43787, CVE-2023-3138), pkg:rpm/redhat/libX11-common@1.7.0-7.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2023-43787, CVE-2023-3138), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libX11@1.7.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2023-43787, CVE-2023-3138), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/source-highlight@3.1.9-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=source-highlight-3.1.9-11.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/source-highlight@3.1.9-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=source-highlight-3.1.9-11.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/source-highlight@3.1.9-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=source-highlight-3.1.9-11.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/source-highlight@3.1.9-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=source-highlight-3.1.9-11.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/source-highlight@3.1.9-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=source-highlight-3.1.9-11.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/source-highlight@3.1.9-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=source-highlight-3.1.9-11.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libicu@67.1-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=icu-67.1-9.el9.src.rpm [transitive via pkg:rpm/redhat/source-highlight@3.1.9-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=source-highlight-3.1.9-11.el9.src.rpm] (CVE-2025-5222), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-31.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=rootfiles-8.1-31.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-31.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=rootfiles-8.1-31.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-31.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=rootfiles-8.1-31.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-31.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=rootfiles-8.1-31.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-31.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=rootfiles-8.1-31.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-31.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=rootfiles-8.1-31.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/hostname@3.23-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=hostname-3.23-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/hostname@3.23-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=hostname-3.23-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/hostname@3.23-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=hostname-3.23-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/hostname@3.23-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=hostname-3.23-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/hostname@3.23-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=hostname-3.23-6.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/hostname@3.23-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=hostname-3.23-6.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/enchant@1.6.0-30.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=enchant-1.6.0-30.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/enchant@1.6.0-30.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=enchant-1.6.0-30.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/enchant@1.6.0-30.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=enchant-1.6.0-30.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/enchant@1.6.0-30.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=enchant-1.6.0-30.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/enchant@1.6.0-30.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=enchant-1.6.0-30.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/enchant@1.6.0-30.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=enchant-1.6.0-30.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/enchant@1.6.0-30.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=enchant-1.6.0-30.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/enchant@1.6.0-30.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=enchant-1.6.0-30.el9.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/enchant@1.6.0-30.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=enchant-1.6.0-30.el9.src.rpm] (CVE-2024-0553, CVE-2024-0567), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/sqlite-devel@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/sqlite-devel@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/sqlite-devel@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/sqlite-devel@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/sqlite-devel@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/sqlite-devel@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/sqlite-devel@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/sqlite-devel@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/dmidecode@3.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dmidecode-3.3-7.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/dmidecode@3.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dmidecode-3.3-7.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/dmidecode@3.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dmidecode-3.3-7.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/dmidecode@3.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dmidecode-3.3-7.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/dmidecode@3.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dmidecode-3.3-7.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/dmidecode@3.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dmidecode-3.3-7.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/emacs-filesystem@27.2-8.el9_2.1?arch=noarch\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=emacs-27.2-8.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-1244, CVE-2024-30205, CVE-2024-39331, CVE-2024-53920), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2023-31486, CVE-2023-47038), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/perl-POSIX@1.94-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Symbol@1.08-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-mro@1.23-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-SelectSaver@1.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Getopt-Std@1.12-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Class-Struct@0.66-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-subs@1.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-Compare@1.100.600-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-vars@1.05-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-interpreter@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overload@1.31-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-libs@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-B@1.80-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-if@0.60.800-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-stat@1.09-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Fcntl@1.13-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IO@1.43-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-Find@1.37-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-Basename@2.85-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-DynaLoader@1.47-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IPC-Open3@1.21-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Errno@1.30-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overloading@0.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2023-47038), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/keyutils-libs-devel@1.6.3-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=keyutils-1.6.3-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/keyutils-libs-devel@1.6.3-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=keyutils-1.6.3-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/keyutils-libs-devel@1.6.3-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=keyutils-1.6.3-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/keyutils-libs-devel@1.6.3-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=keyutils-1.6.3-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/keyutils-libs-devel@1.6.3-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=keyutils-1.6.3-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/keyutils-libs-devel@1.6.3-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=keyutils-1.6.3-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2024-0553, CVE-2024-0567), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/hunspell-en-GB@0.20140811.1-20.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=hunspell-en-0.20140811.1-20.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/hunspell-en-GB@0.20140811.1-20.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=hunspell-en-0.20140811.1-20.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/hunspell-en-GB@0.20140811.1-20.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=hunspell-en-0.20140811.1-20.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/hunspell-en-GB@0.20140811.1-20.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=hunspell-en-0.20140811.1-20.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/hunspell-en-GB@0.20140811.1-20.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=hunspell-en-0.20140811.1-20.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/hunspell-en-GB@0.20140811.1-20.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=hunspell-en-0.20140811.1-20.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/hunspell-en@0.20140811.1-20.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=hunspell-en-0.20140811.1-20.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/hunspell-en@0.20140811.1-20.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=hunspell-en-0.20140811.1-20.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/hunspell-en@0.20140811.1-20.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=hunspell-en-0.20140811.1-20.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/hunspell-en@0.20140811.1-20.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=hunspell-en-0.20140811.1-20.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/hunspell-en@0.20140811.1-20.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=hunspell-en-0.20140811.1-20.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/hunspell-en@0.20140811.1-20.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=hunspell-en-0.20140811.1-20.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2023-31486, CVE-2023-47038), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/perl-POSIX@1.94-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Symbol@1.08-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-mro@1.23-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-SelectSaver@1.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Getopt-Std@1.12-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Class-Struct@0.66-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-subs@1.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-vars@1.05-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-interpreter@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overload@1.31-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-libs@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-if@0.60.800-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-stat@1.09-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Fcntl@1.13-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IO@1.43-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-Basename@2.85-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IPC-Open3@1.21-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Errno@1.30-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overloading@0.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2023-47038), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/llvm-libs@15.0.7-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=llvm-15.0.7-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/llvm-libs@15.0.7-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=llvm-15.0.7-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/llvm-libs@15.0.7-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=llvm-15.0.7-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/llvm-libs@15.0.7-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=llvm-15.0.7-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/llvm-libs@15.0.7-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=llvm-15.0.7-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/llvm-libs@15.0.7-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=llvm-15.0.7-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/tar@1.34-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=tar-1.34-6.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/tar@1.34-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=tar-1.34-6.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/tar@1.34-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=tar-1.34-6.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/tar@1.34-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=tar-1.34-6.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/tar@1.34-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=tar-1.34-6.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/tar@1.34-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=tar-1.34-6.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/annobin@11.05-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=annobin-11.05-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/annobin@11.05-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=annobin-11.05-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/annobin@11.05-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=annobin-11.05-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/annobin@11.05-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=annobin-11.05-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/annobin@11.05-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=annobin-11.05-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/annobin@11.05-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=annobin-11.05-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-gconv-extra@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-gconv-extra@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-gconv-extra@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-gconv-extra@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-gconv-extra@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-gconv-extra@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/vim-minimal@8.2.2637-20.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=vim-8.2.2637-20.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/vim-minimal@8.2.2637-20.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=vim-8.2.2637-20.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/vim-minimal@8.2.2637-20.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=vim-8.2.2637-20.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/vim-minimal@8.2.2637-20.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=vim-8.2.2637-20.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/vim-minimal@8.2.2637-20.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=vim-8.2.2637-20.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/vim-minimal@8.2.2637-20.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=vim-8.2.2637-20.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;rhtpa_high_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 266&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found 372 medium vulnerabilities.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Source: osv-github. Affected dependencies: pkg:npm/tar@6.1.11 [direct] (CVE-2024-28863), pkg:pypi/requests@2.25.1 [direct] (CVE-2023-32681, CVE-2024-35195, CVE-2024-47081, CVE-2026-25645), pkg:npm/brace-expansion@1.1.11 [direct] (CVE-2026-33750), pkg:npm/brace-expansion@2.0.1 [direct] (CVE-2026-33750), pkg:pypi/idna@2.10 [direct] (CVE-2024-3651), pkg:pypi/pip@21.2.3 [direct] (CVE-2023-5752), pkg:pypi/pip@21.3.1 [transitive via pkg:pypi/setuptools@53.0.0] (CVE-2023-5752), pkg:pypi/urllib3@1.26.5 [transitive via pkg:pypi/requests@2.25.1] (CVE-2023-43804, CVE-2025-50181, CVE-2024-37891, CVE-2023-45803), pkg:pypi/idna@2.10 [transitive via pkg:pypi/requests@2.25.1] (CVE-2024-3651); Source: redhat-csaf. Affected dependencies: pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [direct] (CVE-2020-11023), pkg:rpm/redhat/dbus-libs@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm [direct] (CVE-2023-34969), pkg:rpm/redhat/rsync@3.2.3-19.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rsync-3.2.3-19.el9.src.rpm [direct] (CVE-2024-12087, CVE-2024-12088, CVE-2024-12086, CVE-2024-12747, CVE-2025-10158), pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [direct] (CVE-2023-38709, CVE-2025-65082, CVE-2025-66200, CVE-2024-38473, CVE-2024-24795), pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [direct] (CVE-2023-38709, CVE-2025-65082, CVE-2025-66200, CVE-2024-38473, CVE-2024-24795), pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [direct] (CVE-2023-38709, CVE-2025-65082, CVE-2025-66200, CVE-2024-38473, CVE-2024-24795), pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm [direct] (CVE-2022-4285, CVE-2025-11082, CVE-2025-11083, CVE-2025-5244), pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [direct] (CVE-2020-11023), pkg:rpm/redhat/bsdtar@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm [direct] (CVE-2024-57970, CVE-2025-25724), pkg:rpm/redhat/npm@8.19.3-1.16.19.1.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm [direct] (CVE-2025-22150, CVE-2024-21891, CVE-2023-23936, CVE-2024-22020, CVE-2024-22025, CVE-2024-28863, CVE-2025-23167, CVE-2026-1527, CVE-2026-21712, CVE-2026-25547, CVE-2026-26996, CVE-2026-27904, CVE-2024-27982, CVE-2023-31147, CVE-2023-46809, CVE-2025-59466, CVE-2026-21637, CVE-2026-21713, CVE-2026-21717, CVE-2026-2581, CVE-2023-31130, CVE-2023-30588, CVE-2023-39333, CVE-2024-28182, CVE-2025-23085, CVE-2025-55132, CVE-2026-21714, CVE-2026-21711, CVE-2024-21890, CVE-2024-25629, CVE-2023-23920), pkg:rpm/redhat/nodejs-full-i18n@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm [direct] (CVE-2025-22150, CVE-2024-21891, CVE-2022-35256, CVE-2023-23936, CVE-2024-22020, CVE-2024-22025, CVE-2024-28863, CVE-2025-23167, CVE-2026-1527, CVE-2026-21712, CVE-2026-25547, CVE-2026-26996, CVE-2026-27904, CVE-2024-27982, CVE-2023-31147, CVE-2023-46809, CVE-2025-59466, CVE-2026-21637, CVE-2026-21713, CVE-2026-21717, CVE-2026-2581, CVE-2023-31130, CVE-2023-30588, CVE-2023-39333, CVE-2024-28182, CVE-2025-23085, CVE-2026-21714, CVE-2026-21711, CVE-2024-21890, CVE-2024-25629, CVE-2023-23920), pkg:rpm/redhat/python3-decorator@4.4.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-decorator-4.4.2-6.el9.src.rpm [direct] (CVE-2023-2727, CVE-2023-2728), pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm [direct] (CVE-2021-3826), pkg:rpm/redhat/python3-devel@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [direct] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [direct] (CVE-2023-38709, CVE-2025-65082, CVE-2025-66200, CVE-2024-38473, CVE-2024-24795), pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm [direct] (CVE-2025-26465, CVE-2023-51385, CVE-2023-48795, CVE-2025-61984, CVE-2025-61985, CVE-2026-35414, CVE-2025-32728), pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [direct] (CVE-2023-38709, CVE-2025-65082, CVE-2025-66200, CVE-2024-38473, CVE-2024-24795), pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [direct] (CVE-2020-11023), pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm [direct] (CVE-2025-27614, CVE-2024-52006, CVE-2025-27613), pkg:rpm/redhat/python3-pip@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [direct] (CVE-2007-4559), pkg:rpm/redhat/nodejs-docs@16.19.1-1.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm [direct] (CVE-2025-22150, CVE-2024-21891, CVE-2022-35256, CVE-2023-23936, CVE-2024-22020, CVE-2024-22025, CVE-2024-28863, CVE-2025-23167, CVE-2026-1527, CVE-2026-21712, CVE-2026-25547, CVE-2026-26996, CVE-2026-27904, CVE-2024-27982, CVE-2023-31147, CVE-2023-46809, CVE-2025-59466, CVE-2026-21637, CVE-2026-21713, CVE-2026-21717, CVE-2026-2581, CVE-2023-31130, CVE-2023-30588, CVE-2023-39333, CVE-2024-28182, CVE-2025-23085, CVE-2025-55132, CVE-2026-21714, CVE-2026-21711, CVE-2024-21890, CVE-2024-25629, CVE-2023-23920), pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [direct] (CVE-2020-11023), pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm [direct] (CVE-2021-3826), pkg:rpm/redhat/libkadm5@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [direct] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm [direct] (CVE-2024-7143, CVE-2023-43804, CVE-2024-37891, CVE-2023-45803), pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [direct] (CVE-2023-38709, CVE-2025-65082, CVE-2025-66200, CVE-2024-38473, CVE-2024-24795), pkg:rpm/redhat/krb5-devel@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [direct] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576, CVE-2026-40355, CVE-2026-40356), pkg:rpm/redhat/libcurl-devel@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [direct] (CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxslt-1.1.34-9.el9.src.rpm [direct] (CVE-2023-40403), pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [direct] (CVE-2023-39615, CVE-2025-9714, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2025-32414), pkg:rpm/redhat/glibc-locale-source@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [direct] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm [direct] (CVE-2023-4641), pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm [direct] (CVE-2025-40909), pkg:rpm/redhat/apr-devel@1.7.0-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-1.7.0-11.el9.src.rpm [direct] (CVE-2022-24963), pkg:rpm/redhat/libstdc%2B%2B-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [direct] (CVE-2020-11023), pkg:rpm/redhat/xz@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [direct] (CVE-2026-34743), pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [direct] (CVE-2025-40909), pkg:rpm/redhat/file@5.39-12.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=file-5.39-12.el9.src.rpm [direct] (CVE-2022-48554), pkg:rpm/redhat/glibc-headers@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [direct] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/wget@1.21.1-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=wget-1.21.1-7.el9.src.rpm [direct] (CVE-2024-38428), pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [direct] (CVE-2025-40909), pkg:rpm/redhat/bzip2@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [direct] (CVE-2019-12900), pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [direct] (CVE-2025-40909), pkg:rpm/redhat/gdb-gdbserver@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm [direct] (CVE-2021-3826), pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm [direct] (CVE-2023-43788, CVE-2023-43789), pkg:rpm/redhat/tar@1.34-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=tar-1.34-6.el9_1.src.rpm [direct] (CVE-2025-45582), pkg:rpm/redhat/glibc-gconv-extra@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [direct] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/vim-minimal@8.2.2637-20.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=vim-8.2.2637-20.el9_1.src.rpm [direct] (CVE-2021-3903, CVE-2026-28421, CVE-2026-28417, CVE-2025-53905, CVE-2025-53906), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-devel@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-headers@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/kernel-headers@5.14.0-284.11.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=kernel-5.14.0-284.11.1.el9_2.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2022-50616, CVE-2024-56614, CVE-2024-56615, CVE-2025-21883, CVE-2025-21928, CVE-2025-21929, CVE-2025-21991, CVE-2025-22085, CVE-2021-47383, CVE-2025-21759, CVE-2023-28746, CVE-2023-6356, CVE-2023-6535, CVE-2023-6536, CVE-2024-21823, CVE-2025-21999, CVE-2025-38350, CVE-2024-46695, CVE-2024-50275, CVE-2024-42292, CVE-2024-50302, CVE-2022-49395, CVE-2023-5090, CVE-2024-26664, CVE-2024-50264, CVE-2025-38110, CVE-2024-53122, CVE-2024-53197, CVE-2024-36941, CVE-2024-38627, CVE-2022-50042, CVE-2023-1074, CVE-2023-45862, CVE-2023-52490, CVE-2023-52658, CVE-2023-53597, CVE-2023-53704, CVE-2023-54004, CVE-2023-54093, CVE-2023-54271, CVE-2023-7192, CVE-2024-0443, CVE-2024-26615, CVE-2024-26878, CVE-2024-27046, CVE-2024-27052, CVE-2024-35789, CVE-2024-35852, CVE-2024-35890, CVE-2024-35907, CVE-2024-35952, CVE-2024-35989, CVE-2024-39483, CVE-2024-40959, CVE-2024-41035, CVE-2024-41064, CVE-2024-42079, CVE-2024-42272, CVE-2024-42283, CVE-2024-42322, CVE-2024-43854, CVE-2024-44990, CVE-2024-44994, CVE-2024-45018, CVE-2024-46713, CVE-2024-46824, CVE-2024-49949, CVE-2024-50208, CVE-2024-50251, CVE-2024-50252, CVE-2024-53113, CVE-2025-21669, CVE-2025-21962, CVE-2025-21963, CVE-2025-21964, CVE-2025-37785, CVE-2025-38234, CVE-2023-52448, CVE-2023-53755, CVE-2024-47745, CVE-2024-53088, CVE-2025-21961, CVE-2025-22036, CVE-2025-38417, CVE-2023-52771, CVE-2023-52864, CVE-2024-26855, CVE-2024-35845, CVE-2024-36922, CVE-2024-38555, CVE-2024-38556, CVE-2024-43855, CVE-2024-46826, CVE-2024-26897, CVE-2024-38586), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/cpp@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/gcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libquadmath@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libgomp@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2022-4285, CVE-2025-11082, CVE-2025-11083, CVE-2025-5244), pkg:rpm/redhat/binutils@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2022-4285, CVE-2025-11081, CVE-2025-11082, CVE-2025-11083, CVE-2025-11413, CVE-2025-5244), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-39615, CVE-2026-6732, CVE-2025-9714, CVE-2026-1757, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2026-0990, CVE-2025-32414, CVE-2025-26434), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2026-5713, CVE-2025-13837, CVE-2026-4224, CVE-2007-4559, CVE-2026-3644, CVE-2023-27043, CVE-2024-8088, CVE-2025-12781, CVE-2026-3446, CVE-2024-0397, CVE-2024-7592, CVE-2025-15282, CVE-2025-11468, CVE-2026-0865, CVE-2026-1502, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2025-68972), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2025-60753, CVE-2024-57970, CVE-2025-25724), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2025-14512, CVE-2023-29499, CVE-2025-14087, CVE-2025-4373), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/rpm@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libsmartcols@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/file-libs@5.39-12.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=file-5.39-12.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2022-48554), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-39615, CVE-2026-6732, CVE-2025-9714, CVE-2026-1757, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2026-0990, CVE-2025-32414, CVE-2025-26434), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/emacs-filesystem@27.2-8.el9_2.1?arch=noarch\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=emacs-27.2-8.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2024-30203, CVE-2024-30204), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2026-5713, CVE-2025-13837, CVE-2026-4224, CVE-2007-4559, CVE-2026-3644, CVE-2023-27043, CVE-2024-8088, CVE-2025-12781, CVE-2026-3446, CVE-2024-0397, CVE-2024-7592, CVE-2025-15282, CVE-2025-11468, CVE-2026-0865, CVE-2026-1502, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/vim-filesystem@8.2.2637-20.el9_1?arch=noarch\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=vim-8.2.2637-20.el9_1.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2021-3903, CVE-2026-28421, CVE-2026-28417, CVE-2025-53905, CVE-2025-53906), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2025-60753, CVE-2024-57970, CVE-2025-25724), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/rpm@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-39615, CVE-2026-6732, CVE-2025-9714, CVE-2026-1757, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2026-0990, CVE-2025-32414, CVE-2025-26434), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2026-5713, CVE-2025-13837, CVE-2026-4224, CVE-2007-4559, CVE-2026-3644, CVE-2023-27043, CVE-2024-8088, CVE-2025-12781, CVE-2026-3446, CVE-2024-0397, CVE-2024-7592, CVE-2025-15282, CVE-2025-11468, CVE-2026-0865, CVE-2026-1502, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/libcomps@0.1.18-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcomps-0.1.18-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2024-28863, CVE-2026-4324), pkg:rpm/redhat/python3-libcomps@0.1.18-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcomps-0.1.18-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2024-28863, CVE-2026-4324), pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2025-68972), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2025-60753, CVE-2024-57970, CVE-2025-25724), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2025-14512, CVE-2023-29499, CVE-2025-14087, CVE-2025-4373), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/rpm-sign-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm-build-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/python3-rpm@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/tpm2-tss@3.0.3-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=tpm2-tss-3.0.3-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-22745), pkg:rpm/redhat/dbus-libs@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-34969), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libsmartcols@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libgomp@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/systemd-libs@252-13.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-13.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-7008, CVE-2025-4598), pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/file-libs@5.39-12.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=file-5.39-12.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2022-48554), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-4641), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/dbus-libs@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/dbus-libs@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/dbus-libs@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/dbus-libs@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/dbus-libs@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/dbus-libs@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/dbus-libs@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/dbus-libs@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/dbus-libs@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/dbus-libs@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/dbus-libs@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/systemd-libs@252-13.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-13.el9_2.src.rpm [transitive via pkg:rpm/redhat/dbus-libs@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2023-7008, CVE-2025-4598), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/dbus-libs@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2025-9231, CVE-2026-22796, CVE-2026-28388, CVE-2026-28389, CVE-2026-31790, CVE-2026-31789, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2026-28386, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/pam@1.5.1-14.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pam-1.5.1-14.el9.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2024-22365, CVE-2024-10041), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2025-14512, CVE-2023-29499, CVE-2025-14087, CVE-2025-4373), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/libeconf@0.4.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libeconf-0.4.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2023-22652), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libsmartcols@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/util-linux@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libfdisk@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/util-linux-core@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/systemd-libs@252-13.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-13.el9_2.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2023-7008, CVE-2025-4598), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2023-4641), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-19.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rsync-3.2.3-19.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-19.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rsync-3.2.3-19.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-19.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rsync-3.2.3-19.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-19.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rsync-3.2.3-19.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-19.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rsync-3.2.3-19.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-19.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rsync-3.2.3-19.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-19.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rsync-3.2.3-19.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-19.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rsync-3.2.3-19.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-19.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rsync-3.2.3-19.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-19.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rsync-3.2.3-19.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-19.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rsync-3.2.3-19.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2025-9231, CVE-2026-22796, CVE-2026-28388, CVE-2026-28389, CVE-2026-31790, CVE-2026-31789, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2026-28386, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/pam@1.5.1-14.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pam-1.5.1-14.el9.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2024-22365, CVE-2024-10041), pkg:rpm/redhat/systemd@252-13.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-13.el9_2.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2026-40224, CVE-2026-4105, CVE-2026-40225, CVE-2026-40226, CVE-2023-7008, CVE-2026-40227, CVE-2025-4598, CVE-2026-40223), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/libeconf@0.4.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libeconf-0.4.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2023-22652), pkg:rpm/redhat/dbus-common@1.12.20-7.el9_1?arch=noarch\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2023-34969), pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2023-34969), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libsmartcols@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/util-linux@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libfdisk@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/util-linux-core@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/systemd-pam@252-13.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-13.el9_2.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2023-7008, CVE-2025-4598), pkg:rpm/redhat/systemd-rpm-macros@252-13.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=systemd-252-13.el9_2.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2023-7008, CVE-2025-4598), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/systemd-libs@252-13.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-13.el9_2.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2023-7008, CVE-2025-4598), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2023-4641), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-pysocks@1.7.1-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pysocks-1.7.1-12.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pysocks@1.7.1-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pysocks-1.7.1-12.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pysocks@1.7.1-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pysocks-1.7.1-12.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pysocks@1.7.1-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pysocks-1.7.1-12.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pysocks@1.7.1-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pysocks-1.7.1-12.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pysocks@1.7.1-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pysocks-1.7.1-12.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pysocks@1.7.1-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pysocks-1.7.1-12.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2026-5713, CVE-2025-13837, CVE-2026-4224, CVE-2007-4559, CVE-2026-3644, CVE-2023-27043, CVE-2024-8088, CVE-2025-12781, CVE-2026-3446, CVE-2024-0397, CVE-2024-7592, CVE-2025-15282, CVE-2025-11468, CVE-2026-0865, CVE-2026-1502, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pysocks@1.7.1-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pysocks-1.7.1-12.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pysocks@1.7.1-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pysocks-1.7.1-12.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pysocks@1.7.1-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pysocks-1.7.1-12.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pysocks@1.7.1-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pysocks-1.7.1-12.el9.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pysocks@1.7.1-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pysocks-1.7.1-12.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pysocks@1.7.1-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pysocks-1.7.1-12.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-pysocks@1.7.1-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pysocks-1.7.1-12.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pysocks@1.7.1-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pysocks-1.7.1-12.el9.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pysocks@1.7.1-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pysocks-1.7.1-12.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pysocks@1.7.1-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pysocks-1.7.1-12.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2026-5713, CVE-2025-13837, CVE-2026-4224, CVE-2007-4559, CVE-2026-3644, CVE-2023-27043, CVE-2024-8088, CVE-2025-12781, CVE-2026-3446, CVE-2024-0397, CVE-2024-7592, CVE-2025-15282, CVE-2025-11468, CVE-2026-0865, CVE-2026-1502, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2026-5713, CVE-2025-13837, CVE-2026-4224, CVE-2007-4559, CVE-2026-3644, CVE-2023-27043, CVE-2024-8088, CVE-2025-12781, CVE-2026-3446, CVE-2024-0397, CVE-2024-7592, CVE-2025-15282, CVE-2025-11468, CVE-2026-0865, CVE-2026-1502, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2025-14512, CVE-2023-29499, CVE-2025-14087, CVE-2025-4373), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2023-39615, CVE-2026-6732, CVE-2025-9714, CVE-2026-1757, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2026-0990, CVE-2025-32414, CVE-2025-26434), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2025-60753, CVE-2024-57970, CVE-2025-25724), pkg:rpm/redhat/go-srpm-macros@3.2.0-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=go-rpm-macros-3.2.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2025-47906), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/perl-mro@1.23-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Class-Struct@0.66-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-subs@1.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-interpreter@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overload@1.31-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-libs@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-stat@1.09-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IO@1.43-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-Basename@2.85-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-POSIX@1.94-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Symbol@1.08-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-SelectSaver@1.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Getopt-Std@1.12-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-vars@1.05-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-if@0.60.800-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Fcntl@1.13-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IPC-Open3@1.21-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Errno@1.30-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overloading@0.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/perl-Storable@3.21-460.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=perl-Storable-3.21-460.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2017-20230), pkg:rpm/redhat/qt5-srpm-macros@5.15.3-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=qt5-5.15.3-1.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2023-32573, CVE-2023-33285, CVE-2023-34410), pkg:rpm/redhat/rpm@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/file@5.39-12.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=file-5.39-12.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2022-48554), pkg:rpm/redhat/file-libs@5.39-12.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=file-5.39-12.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2022-48554), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=procps-ng-3.3.17-11.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=procps-ng-3.3.17-11.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=procps-ng-3.3.17-11.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=procps-ng-3.3.17-11.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=procps-ng-3.3.17-11.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=procps-ng-3.3.17-11.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=procps-ng-3.3.17-11.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=procps-ng-3.3.17-11.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=procps-ng-3.3.17-11.el9.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=procps-ng-3.3.17-11.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=procps-ng-3.3.17-11.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/systemd-libs@252-13.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-13.el9_2.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=procps-ng-3.3.17-11.el9.src.rpm] (CVE-2023-7008, CVE-2025-4598), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=procps-ng-3.3.17-11.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20221215-1.git9a18988.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=crypto-policies-20221215-1.git9a18988.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20221215-1.git9a18988.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=crypto-policies-20221215-1.git9a18988.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20221215-1.git9a18988.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=crypto-policies-20221215-1.git9a18988.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20221215-1.git9a18988.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=crypto-policies-20221215-1.git9a18988.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20221215-1.git9a18988.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=crypto-policies-20221215-1.git9a18988.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20221215-1.git9a18988.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=crypto-policies-20221215-1.git9a18988.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20221215-1.git9a18988.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=crypto-policies-20221215-1.git9a18988.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2026-5713, CVE-2025-13837, CVE-2026-4224, CVE-2007-4559, CVE-2026-3644, CVE-2023-27043, CVE-2024-8088, CVE-2025-12781, CVE-2026-3446, CVE-2024-0397, CVE-2024-7592, CVE-2025-15282, CVE-2025-11468, CVE-2026-0865, CVE-2026-1502, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20221215-1.git9a18988.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=crypto-policies-20221215-1.git9a18988.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20221215-1.git9a18988.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=crypto-policies-20221215-1.git9a18988.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20221215-1.git9a18988.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=crypto-policies-20221215-1.git9a18988.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20221215-1.git9a18988.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=crypto-policies-20221215-1.git9a18988.el9.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20221215-1.git9a18988.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=crypto-policies-20221215-1.git9a18988.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20221215-1.git9a18988.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=crypto-policies-20221215-1.git9a18988.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20221215-1.git9a18988.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=crypto-policies-20221215-1.git9a18988.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20221215-1.git9a18988.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=crypto-policies-20221215-1.git9a18988.el9.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20221215-1.git9a18988.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=crypto-policies-20221215-1.git9a18988.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20221215-1.git9a18988.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=crypto-policies-20221215-1.git9a18988.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/perl-POSIX@1.94-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Symbol@1.08-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-mro@1.23-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-AutoLoader@5.74-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-SelectSaver@1.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Getopt-Std@1.12-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Class-Struct@0.66-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-subs@1.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-vars@1.05-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-interpreter@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overload@1.31-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-libs@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-B@1.80-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-if@0.60.800-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-stat@1.09-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Fcntl@1.13-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IO@1.43-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-Basename@2.85-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-base@2.27-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IPC-Open3@1.21-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Errno@1.30-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overloading@0.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Storable@3.21-460.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=perl-Storable-3.21-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2017-20230), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm] (CVE-2023-38709, CVE-2025-65082, CVE-2025-66200, CVE-2024-38473, CVE-2024-24795), pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm] (CVE-2023-38709, CVE-2025-65082, CVE-2025-66200, CVE-2024-38473, CVE-2024-24795), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/httpd-filesystem@2.4.53-11.el9_2.5?arch=noarch\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm] (CVE-2023-38709, CVE-2025-65082, CVE-2025-66200, CVE-2024-38473, CVE-2024-24795), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/apr@1.7.0-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-1.7.0-11.el9.src.rpm [transitive via pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm] (CVE-2022-24963), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm] (CVE-2023-4641), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-38709, CVE-2025-65082, CVE-2025-66200, CVE-2024-38473, CVE-2024-24795), pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-38709, CVE-2025-65082, CVE-2025-66200, CVE-2024-38473, CVE-2024-24795), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/httpd-filesystem@2.4.53-11.el9_2.5?arch=noarch\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-38709, CVE-2025-65082, CVE-2025-66200, CVE-2024-38473, CVE-2024-24795), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/apr@1.7.0-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-1.7.0-11.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2022-24963), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-4641), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-38709, CVE-2025-65082, CVE-2025-66200, CVE-2024-38473, CVE-2024-24795), pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-38709, CVE-2025-65082, CVE-2025-66200, CVE-2024-38473, CVE-2024-24795), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/httpd-filesystem@2.4.53-11.el9_2.5?arch=noarch\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-38709, CVE-2025-65082, CVE-2025-66200, CVE-2024-38473, CVE-2024-24795), pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2025-9231, CVE-2026-22796, CVE-2026-28388, CVE-2026-28389, CVE-2026-31790, CVE-2026-31789, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2026-28386, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/pam@1.5.1-14.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pam-1.5.1-14.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-22365, CVE-2024-10041), pkg:rpm/redhat/systemd@252-13.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-13.el9_2.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2026-40224, CVE-2026-4105, CVE-2026-40225, CVE-2026-40226, CVE-2023-7008, CVE-2026-40227, CVE-2025-4598, CVE-2026-40223), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/expat-devel@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/perl-mro@1.23-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Class-Struct@0.66-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-subs@1.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-interpreter@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overload@1.31-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-libs@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-stat@1.09-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IO@1.43-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-Basename@2.85-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-POSIX@1.94-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Symbol@1.08-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-SelectSaver@1.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Getopt-Std@1.12-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-vars@1.05-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-if@0.60.800-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Fcntl@1.13-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IPC-Open3@1.21-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Errno@1.30-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overloading@0.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/libeconf@0.4.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libeconf-0.4.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-22652), pkg:rpm/redhat/apr-devel@1.7.0-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-1.7.0-11.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2022-24963), pkg:rpm/redhat/apr@1.7.0-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-1.7.0-11.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2022-24963), pkg:rpm/redhat/perl-Storable@3.21-460.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=perl-Storable-3.21-460.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2017-20230), pkg:rpm/redhat/dbus-common@1.12.20-7.el9_1?arch=noarch\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-34969), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-34969), pkg:rpm/redhat/libsmartcols@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/util-linux@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/util-linux-core@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libfdisk@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/systemd-pam@252-13.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-13.el9_2.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-7008, CVE-2025-4598), pkg:rpm/redhat/systemd-rpm-macros@252-13.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=systemd-252-13.el9_2.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-7008, CVE-2025-4598), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/systemd-libs@252-13.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-13.el9_2.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-7008, CVE-2025-4598), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-4641), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/apr-util-openssl@1.6.1-20.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-util-1.6.1-20.el9_2.1.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/apr-util-openssl@1.6.1-20.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-util-1.6.1-20.el9_2.1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/apr-util-openssl@1.6.1-20.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-util-1.6.1-20.el9_2.1.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/apr-util-openssl@1.6.1-20.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-util-1.6.1-20.el9_2.1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/apr-util-openssl@1.6.1-20.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-util-1.6.1-20.el9_2.1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/apr-util-openssl@1.6.1-20.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-util-1.6.1-20.el9_2.1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/apr-util-openssl@1.6.1-20.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-util-1.6.1-20.el9_2.1.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/apr-util-openssl@1.6.1-20.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-util-1.6.1-20.el9_2.1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/apr-util-openssl@1.6.1-20.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-util-1.6.1-20.el9_2.1.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/apr@1.7.0-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-1.7.0-11.el9.src.rpm [transitive via pkg:rpm/redhat/apr-util-openssl@1.6.1-20.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-util-1.6.1-20.el9_2.1.src.rpm] (CVE-2022-24963), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/apr-util-openssl@1.6.1-20.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-util-1.6.1-20.el9_2.1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/apr-util-openssl@1.6.1-20.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-util-1.6.1-20.el9_2.1.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/apr-util-openssl@1.6.1-20.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-util-1.6.1-20.el9_2.1.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/apr-util-openssl@1.6.1-20.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-util-1.6.1-20.el9_2.1.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-39615, CVE-2026-6732, CVE-2025-9714, CVE-2026-1757, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2026-0990, CVE-2025-32414, CVE-2025-26434), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2026-5713, CVE-2025-13837, CVE-2026-4224, CVE-2007-4559, CVE-2026-3644, CVE-2023-27043, CVE-2024-8088, CVE-2025-12781, CVE-2026-3446, CVE-2024-0397, CVE-2024-7592, CVE-2025-15282, CVE-2025-11468, CVE-2026-0865, CVE-2026-1502, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/freetype@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2026-23865), pkg:rpm/redhat/libX11-common@1.7.0-7.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-43785, CVE-2023-43786), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libX11@1.7.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-43785, CVE-2023-43786), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2025-14512, CVE-2023-29499, CVE-2025-14087, CVE-2025-4373), pkg:rpm/redhat/glib2-devel@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2023-29499, CVE-2025-4373), pkg:rpm/redhat/libpng@1.6.37-12.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=libpng-1.6.37-12.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2026-22801, CVE-2025-28162, CVE-2025-64506, CVE-2026-22695, CVE-2026-3713, CVE-2025-28164, CVE-2025-64505), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/harfbuzz@2.7.4-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=harfbuzz-2.7.4-8.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2026-22693), pkg:rpm/redhat/libpng-devel@1.6.37-12.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=libpng-1.6.37-12.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2026-22801, CVE-2026-22695), pkg:rpm/redhat/libmount-devel@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libblkid-devel@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/bzip2-devel@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/openssl-devel@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2025-9231, CVE-2026-22796, CVE-2026-28388, CVE-2026-28389, CVE-2026-31790, CVE-2026-31789, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2026-28386, CVE-2025-69418), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/pam@1.5.1-14.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pam-1.5.1-14.el9.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2024-22365, CVE-2024-10041), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/libeconf@0.4.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libeconf-0.4.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2023-22652), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libsmartcols@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/util-linux@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libfdisk@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/util-linux-core@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/systemd-libs@252-13.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-13.el9_2.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2023-7008, CVE-2025-4598), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2023-4641), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-38709, CVE-2025-65082, CVE-2025-66200, CVE-2024-38473, CVE-2024-24795), pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-38709, CVE-2025-65082, CVE-2025-66200, CVE-2024-38473, CVE-2024-24795), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/httpd-filesystem@2.4.53-11.el9_2.5?arch=noarch\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-38709, CVE-2025-65082, CVE-2025-66200, CVE-2024-38473, CVE-2024-24795), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/apr@1.7.0-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-1.7.0-11.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2022-24963), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-4641), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm] (CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm] (CVE-2022-4285, CVE-2025-11082, CVE-2025-11083, CVE-2025-5244), pkg:rpm/redhat/binutils@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm] (CVE-2022-4285, CVE-2025-11081, CVE-2025-11082, CVE-2025-11083, CVE-2025-11413, CVE-2025-5244), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2026-5713, CVE-2025-13837, CVE-2026-4224, CVE-2007-4559, CVE-2026-3644, CVE-2023-27043, CVE-2024-8088, CVE-2025-12781, CVE-2026-3446, CVE-2024-0397, CVE-2024-7592, CVE-2025-15282, CVE-2025-11468, CVE-2026-0865, CVE-2026-1502, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-39615, CVE-2026-6732, CVE-2025-9714, CVE-2026-1757, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2026-0990, CVE-2025-32414, CVE-2025-26434), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2026-5713, CVE-2025-13837, CVE-2026-4224, CVE-2007-4559, CVE-2026-3644, CVE-2023-27043, CVE-2024-8088, CVE-2025-12781, CVE-2026-3446, CVE-2024-0397, CVE-2024-7592, CVE-2025-15282, CVE-2025-11468, CVE-2026-0865, CVE-2026-1502, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2025-60753, CVE-2024-57970, CVE-2025-25724), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/rpm@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-devel@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-headers@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/kernel-headers@5.14.0-284.11.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=kernel-5.14.0-284.11.1.el9_2.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2022-50616, CVE-2024-56614, CVE-2024-56615, CVE-2025-21883, CVE-2025-21928, CVE-2025-21929, CVE-2025-21991, CVE-2025-22085, CVE-2021-47383, CVE-2025-21759, CVE-2023-28746, CVE-2023-6356, CVE-2023-6535, CVE-2023-6536, CVE-2024-21823, CVE-2025-21999, CVE-2025-38350, CVE-2024-46695, CVE-2024-50275, CVE-2024-42292, CVE-2024-50302, CVE-2022-49395, CVE-2023-5090, CVE-2024-26664, CVE-2024-50264, CVE-2025-38110, CVE-2024-53122, CVE-2024-53197, CVE-2024-36941, CVE-2024-38627, CVE-2022-50042, CVE-2023-1074, CVE-2023-45862, CVE-2023-52490, CVE-2023-52658, CVE-2023-53597, CVE-2023-53704, CVE-2023-54004, CVE-2023-54093, CVE-2023-54271, CVE-2023-7192, CVE-2024-0443, CVE-2024-26615, CVE-2024-26878, CVE-2024-27046, CVE-2024-27052, CVE-2024-35789, CVE-2024-35852, CVE-2024-35890, CVE-2024-35907, CVE-2024-35952, CVE-2024-35989, CVE-2024-39483, CVE-2024-40959, CVE-2024-41035, CVE-2024-41064, CVE-2024-42079, CVE-2024-42272, CVE-2024-42283, CVE-2024-42322, CVE-2024-43854, CVE-2024-44990, CVE-2024-44994, CVE-2024-45018, CVE-2024-46713, CVE-2024-46824, CVE-2024-49949, CVE-2024-50208, CVE-2024-50251, CVE-2024-50252, CVE-2024-53113, CVE-2025-21669, CVE-2025-21962, CVE-2025-21963, CVE-2025-21964, CVE-2025-37785, CVE-2025-38234, CVE-2023-52448, CVE-2023-53755, CVE-2024-47745, CVE-2024-53088, CVE-2025-21961, CVE-2025-22036, CVE-2025-38417, CVE-2023-52771, CVE-2023-52864, CVE-2024-26855, CVE-2024-35845, CVE-2024-36922, CVE-2024-38555, CVE-2024-38556, CVE-2024-43855, CVE-2024-46826, CVE-2024-26897, CVE-2024-38586), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/cpp@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/gcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libgomp@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2022-4285, CVE-2025-11082, CVE-2025-11083, CVE-2025-5244), pkg:rpm/redhat/binutils@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2022-4285, CVE-2025-11081, CVE-2025-11082, CVE-2025-11083, CVE-2025-11413, CVE-2025-5244), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2023-39615, CVE-2026-6732, CVE-2025-9714, CVE-2026-1757, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2026-0990, CVE-2025-32414, CVE-2025-26434), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2026-5713, CVE-2025-13837, CVE-2026-4224, CVE-2007-4559, CVE-2026-3644, CVE-2023-27043, CVE-2024-8088, CVE-2025-12781, CVE-2026-3446, CVE-2024-0397, CVE-2024-7592, CVE-2025-15282, CVE-2025-11468, CVE-2026-0865, CVE-2026-1502, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2025-68972), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2025-14512, CVE-2023-29499, CVE-2025-14087, CVE-2025-4373), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm] (CVE-2023-39615, CVE-2026-6732, CVE-2025-9714, CVE-2026-1757, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2026-0990, CVE-2025-32414, CVE-2025-26434), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm] (CVE-2025-60753, CVE-2024-57970, CVE-2025-25724), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm] (CVE-2023-38709, CVE-2025-65082, CVE-2025-66200, CVE-2024-38473, CVE-2024-24795), pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm] (CVE-2023-38709, CVE-2025-65082, CVE-2025-66200, CVE-2024-38473, CVE-2024-24795), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/httpd-filesystem@2.4.53-11.el9_2.5?arch=noarch\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm] (CVE-2023-38709, CVE-2025-65082, CVE-2025-66200, CVE-2024-38473, CVE-2024-24795), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/apr@1.7.0-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-1.7.0-11.el9.src.rpm [transitive via pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm] (CVE-2022-24963), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm] (CVE-2023-4641), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/nodejs@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.3-1.16.19.1.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2025-22150, CVE-2024-21891, CVE-2022-35256, CVE-2023-23936, CVE-2024-22020, CVE-2024-22025, CVE-2024-28863, CVE-2025-23167, CVE-2026-1527, CVE-2026-21712, CVE-2026-25547, CVE-2026-26996, CVE-2026-27904, CVE-2024-27982, CVE-2023-31147, CVE-2023-46809, CVE-2025-59466, CVE-2026-21637, CVE-2026-21713, CVE-2026-21717, CVE-2026-2581, CVE-2023-31130, CVE-2023-30588, CVE-2023-39333, CVE-2024-28182, CVE-2025-23085, CVE-2026-21714, CVE-2026-21711, CVE-2024-21890, CVE-2024-25629, CVE-2023-23920), pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.3-1.16.19.1.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2025-9231, CVE-2026-22796, CVE-2026-28388, CVE-2026-28389, CVE-2026-31790, CVE-2026-31789, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2026-28386, CVE-2025-69418), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.3-1.16.19.1.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.3-1.16.19.1.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.3-1.16.19.1.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.3-1.16.19.1.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.3-1.16.19.1.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/nodejs-libs@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.3-1.16.19.1.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2025-22150, CVE-2023-23936, CVE-2024-22025, CVE-2026-1527, CVE-2026-21712, CVE-2026-25547, CVE-2026-26996, CVE-2026-27904, CVE-2024-27982, CVE-2023-31147, CVE-2025-59466, CVE-2026-21637, CVE-2026-21713, CVE-2026-21717, CVE-2026-2581, CVE-2023-31130, CVE-2023-30588, CVE-2024-28182, CVE-2025-23085, CVE-2026-21714, CVE-2026-21711, CVE-2024-25629, CVE-2023-23920), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.3-1.16.19.1.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.3-1.16.19.1.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.3-1.16.19.1.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.3-1.16.19.1.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.3-1.16.19.1.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.3-1.16.19.1.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.3-1.16.19.1.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/nodejs@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2025-22150, CVE-2024-21891, CVE-2022-35256, CVE-2023-23936, CVE-2024-22020, CVE-2024-22025, CVE-2024-28863, CVE-2025-23167, CVE-2026-1527, CVE-2026-21712, CVE-2026-25547, CVE-2026-26996, CVE-2026-27904, CVE-2024-27982, CVE-2023-31147, CVE-2023-46809, CVE-2025-59466, CVE-2026-21637, CVE-2026-21713, CVE-2026-21717, CVE-2026-2581, CVE-2023-31130, CVE-2023-30588, CVE-2023-39333, CVE-2024-28182, CVE-2025-23085, CVE-2026-21714, CVE-2026-21711, CVE-2024-21890, CVE-2024-25629, CVE-2023-23920), pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2025-9231, CVE-2026-22796, CVE-2026-28388, CVE-2026-28389, CVE-2026-31790, CVE-2026-31789, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2026-28386, CVE-2025-69418), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/nodejs-libs@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2025-22150, CVE-2023-23936, CVE-2024-22025, CVE-2026-1527, CVE-2026-21712, CVE-2026-25547, CVE-2026-26996, CVE-2026-27904, CVE-2024-27982, CVE-2023-31147, CVE-2025-59466, CVE-2026-21637, CVE-2026-21713, CVE-2026-21717, CVE-2026-2581, CVE-2023-31130, CVE-2023-30588, CVE-2024-28182, CVE-2025-23085, CVE-2026-21714, CVE-2026-21711, CVE-2024-25629, CVE-2023-23920), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-decorator@4.4.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-decorator-4.4.2-6.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-decorator@4.4.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-decorator-4.4.2-6.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-decorator@4.4.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-decorator-4.4.2-6.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-decorator@4.4.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-decorator-4.4.2-6.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-decorator@4.4.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-decorator-4.4.2-6.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-decorator@4.4.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-decorator-4.4.2-6.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-decorator@4.4.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-decorator-4.4.2-6.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2026-5713, CVE-2025-13837, CVE-2026-4224, CVE-2007-4559, CVE-2026-3644, CVE-2023-27043, CVE-2024-8088, CVE-2025-12781, CVE-2026-3446, CVE-2024-0397, CVE-2024-7592, CVE-2025-15282, CVE-2025-11468, CVE-2026-0865, CVE-2026-1502, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-decorator@4.4.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-decorator-4.4.2-6.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-decorator@4.4.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-decorator-4.4.2-6.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-decorator@4.4.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-decorator-4.4.2-6.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-decorator@4.4.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-decorator-4.4.2-6.el9.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/python3-decorator@4.4.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-decorator-4.4.2-6.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-decorator@4.4.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-decorator-4.4.2-6.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-decorator@4.4.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-decorator-4.4.2-6.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-decorator@4.4.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-decorator-4.4.2-6.el9.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/python3-decorator@4.4.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-decorator-4.4.2-6.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-decorator@4.4.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-decorator-4.4.2-6.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=environment-modules-5.0.1-2.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=environment-modules-5.0.1-2.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=environment-modules-5.0.1-2.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=environment-modules-5.0.1-2.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=environment-modules-5.0.1-2.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/vim-filesystem@8.2.2637-20.el9_1?arch=noarch\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=vim-8.2.2637-20.el9_1.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=environment-modules-5.0.1-2.el9.src.rpm] (CVE-2021-3903, CVE-2026-28421, CVE-2026-28417, CVE-2025-53905, CVE-2025-53906), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=environment-modules-5.0.1-2.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=environment-modules-5.0.1-2.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=environment-modules-5.0.1-2.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=environment-modules-5.0.1-2.el9.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=environment-modules-5.0.1-2.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=environment-modules-5.0.1-2.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=environment-modules-5.0.1-2.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/systemd-libs@252-13.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-13.el9_2.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=environment-modules-5.0.1-2.el9.src.rpm] (CVE-2023-7008, CVE-2025-4598), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=environment-modules-5.0.1-2.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2025-14512, CVE-2023-29499, CVE-2025-14087, CVE-2025-4373), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-39615, CVE-2026-6732, CVE-2025-9714, CVE-2026-1757, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2026-0990, CVE-2025-32414, CVE-2025-26434), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2026-5713, CVE-2025-13837, CVE-2026-4224, CVE-2007-4559, CVE-2026-3644, CVE-2023-27043, CVE-2024-8088, CVE-2025-12781, CVE-2026-3446, CVE-2024-0397, CVE-2024-7592, CVE-2025-15282, CVE-2025-11468, CVE-2026-0865, CVE-2026-1502, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/libcomps@0.1.18-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcomps-0.1.18-1.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2024-28863, CVE-2026-4324), pkg:rpm/redhat/python3-libcomps@0.1.18-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcomps-0.1.18-1.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2024-28863, CVE-2026-4324), pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2025-68972), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2025-60753, CVE-2024-57970, CVE-2025-25724), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2025-14512, CVE-2023-29499, CVE-2025-14087, CVE-2025-4373), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/rpm-sign-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm-build-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/python3-rpm@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/tpm2-tss@3.0.3-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=tpm2-tss-3.0.3-8.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-22745), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libsmartcols@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libgomp@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/file-libs@5.39-12.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=file-5.39-12.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2022-48554), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-4641), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-devel@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-devel@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-devel@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-devel@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-devel@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-devel@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-devel@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2026-5713, CVE-2025-13837, CVE-2026-4224, CVE-2007-4559, CVE-2026-3644, CVE-2023-27043, CVE-2024-8088, CVE-2025-12781, CVE-2026-3446, CVE-2024-0397, CVE-2024-7592, CVE-2025-15282, CVE-2025-11468, CVE-2026-0865, CVE-2026-1502, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-devel@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-devel@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-devel@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-devel@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-devel@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/python3-devel@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-devel@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-devel@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/python3-devel@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-devel@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-systemd@234-18.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-systemd-234-18.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-systemd@234-18.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-systemd-234-18.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-systemd@234-18.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-systemd-234-18.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-systemd@234-18.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-systemd-234-18.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-systemd@234-18.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-systemd-234-18.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-systemd@234-18.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-systemd-234-18.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-systemd@234-18.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-systemd-234-18.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2026-5713, CVE-2025-13837, CVE-2026-4224, CVE-2007-4559, CVE-2026-3644, CVE-2023-27043, CVE-2024-8088, CVE-2025-12781, CVE-2026-3446, CVE-2024-0397, CVE-2024-7592, CVE-2025-15282, CVE-2025-11468, CVE-2026-0865, CVE-2026-1502, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-systemd@234-18.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-systemd-234-18.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-systemd@234-18.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-systemd-234-18.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-systemd@234-18.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-systemd-234-18.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-systemd@234-18.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-systemd-234-18.el9.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-systemd@234-18.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-systemd-234-18.el9.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-systemd@234-18.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-systemd-234-18.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/python3-systemd@234-18.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-systemd-234-18.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-systemd@234-18.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-systemd-234-18.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/systemd-libs@252-13.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-13.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-systemd@234-18.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-systemd-234-18.el9.src.rpm] (CVE-2023-7008, CVE-2025-4598), pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-systemd@234-18.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-systemd-234-18.el9.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/python3-systemd@234-18.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-systemd-234-18.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-systemd@234-18.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-systemd-234-18.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-38709, CVE-2025-65082, CVE-2025-66200, CVE-2024-38473, CVE-2024-24795), pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-38709, CVE-2025-65082, CVE-2025-66200, CVE-2024-38473, CVE-2024-24795), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/httpd-filesystem@2.4.53-11.el9_2.5?arch=noarch\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-38709, CVE-2025-65082, CVE-2025-66200, CVE-2024-38473, CVE-2024-24795), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/apr@1.7.0-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-1.7.0-11.el9.src.rpm [transitive via pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2022-24963), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-4641), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2025-9231, CVE-2026-22796, CVE-2026-28388, CVE-2026-28389, CVE-2026-31790, CVE-2026-31789, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2026-28386, CVE-2025-69418), pkg:rpm/redhat/openssh@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2025-26465, CVE-2023-51385, CVE-2023-48795, CVE-2025-61984, CVE-2025-61985, CVE-2026-35414, CVE-2025-32728), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/pam@1.5.1-14.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pam-1.5.1-14.el9.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2024-22365, CVE-2024-10041), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/libeconf@0.4.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libeconf-0.4.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2023-22652), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libsmartcols@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/util-linux@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libfdisk@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/util-linux-core@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/systemd-libs@252-13.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-13.el9_2.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2023-7008, CVE-2025-4598), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2023-4641), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2026-5713, CVE-2025-13837, CVE-2026-4224, CVE-2007-4559, CVE-2026-3644, CVE-2023-27043, CVE-2024-8088, CVE-2025-12781, CVE-2026-3446, CVE-2024-0397, CVE-2024-7592, CVE-2025-15282, CVE-2025-11468, CVE-2026-0865, CVE-2026-1502, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-39615, CVE-2026-6732, CVE-2025-9714, CVE-2026-1757, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2026-0990, CVE-2025-32414, CVE-2025-26434), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2026-5713, CVE-2025-13837, CVE-2026-4224, CVE-2007-4559, CVE-2026-3644, CVE-2023-27043, CVE-2024-8088, CVE-2025-12781, CVE-2026-3446, CVE-2024-0397, CVE-2024-7592, CVE-2025-15282, CVE-2025-11468, CVE-2026-0865, CVE-2026-1502, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2025-68972), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2025-60753, CVE-2024-57970, CVE-2025-25724), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2025-14512, CVE-2023-29499, CVE-2025-14087, CVE-2025-4373), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libsmartcols@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/file-libs@5.39-12.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=file-5.39-12.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2022-48554), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-38709, CVE-2025-65082, CVE-2025-66200, CVE-2024-38473, CVE-2024-24795), pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-38709, CVE-2025-65082, CVE-2025-66200, CVE-2024-38473, CVE-2024-24795), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/httpd-filesystem@2.4.53-11.el9_2.5?arch=noarch\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-38709, CVE-2025-65082, CVE-2025-66200, CVE-2024-38473, CVE-2024-24795), pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2025-9231, CVE-2026-22796, CVE-2026-28388, CVE-2026-28389, CVE-2026-31790, CVE-2026-31789, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2026-28386, CVE-2025-69418), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/pam@1.5.1-14.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pam-1.5.1-14.el9.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-22365, CVE-2024-10041), pkg:rpm/redhat/systemd@252-13.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-13.el9_2.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2026-40224, CVE-2026-4105, CVE-2026-40225, CVE-2026-40226, CVE-2023-7008, CVE-2026-40227, CVE-2025-4598, CVE-2026-40223), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/libeconf@0.4.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libeconf-0.4.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-22652), pkg:rpm/redhat/apr@1.7.0-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-1.7.0-11.el9.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2022-24963), pkg:rpm/redhat/dbus-common@1.12.20-7.el9_1?arch=noarch\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-34969), pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-34969), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libsmartcols@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/util-linux@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libfdisk@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/util-linux-core@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/systemd-pam@252-13.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-13.el9_2.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-7008, CVE-2025-4598), pkg:rpm/redhat/systemd-rpm-macros@252-13.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=systemd-252-13.el9_2.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-7008, CVE-2025-4598), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/systemd-libs@252-13.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-13.el9_2.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-7008, CVE-2025-4598), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-4641), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2023-39615, CVE-2026-6732, CVE-2025-9714, CVE-2026-1757, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2026-0990, CVE-2025-32414, CVE-2025-26434), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/vim-filesystem@8.2.2637-20.el9_1?arch=noarch\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=vim-8.2.2637-20.el9_1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2021-3903, CVE-2026-28421, CVE-2026-28417, CVE-2025-53905, CVE-2025-53906), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2025-60753, CVE-2024-57970, CVE-2025-25724), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/rpm@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/systemd-libs@252-13.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-13.el9_2.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2023-7008, CVE-2025-4598), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-39615, CVE-2026-6732, CVE-2025-9714, CVE-2026-1757, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2026-0990, CVE-2025-32414, CVE-2025-26434), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2026-5713, CVE-2025-13837, CVE-2026-4224, CVE-2007-4559, CVE-2026-3644, CVE-2023-27043, CVE-2024-8088, CVE-2025-12781, CVE-2026-3446, CVE-2024-0397, CVE-2024-7592, CVE-2025-15282, CVE-2025-11468, CVE-2026-0865, CVE-2026-1502, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/libcomps@0.1.18-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcomps-0.1.18-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2024-28863, CVE-2026-4324), pkg:rpm/redhat/python3-libcomps@0.1.18-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcomps-0.1.18-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2024-28863, CVE-2026-4324), pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2025-68972), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2025-60753, CVE-2024-57970, CVE-2025-25724), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2025-14512, CVE-2023-29499, CVE-2025-14087, CVE-2025-4373), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/rpm-sign-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm-build-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/python3-rpm@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/tpm2-tss@3.0.3-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=tpm2-tss-3.0.3-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-22745), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libsmartcols@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libgomp@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/file-libs@5.39-12.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=file-5.39-12.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2022-48554), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-4641), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-39615, CVE-2026-6732, CVE-2025-9714, CVE-2026-1757, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2026-0990, CVE-2025-32414, CVE-2025-26434), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2026-5713, CVE-2025-13837, CVE-2026-4224, CVE-2007-4559, CVE-2026-3644, CVE-2023-27043, CVE-2024-8088, CVE-2025-12781, CVE-2026-3446, CVE-2024-0397, CVE-2024-7592, CVE-2025-15282, CVE-2025-11468, CVE-2026-0865, CVE-2026-1502, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2025-68972), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2025-60753, CVE-2024-57970, CVE-2025-25724), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/rpm-sign-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm-build-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/python3-rpm@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/tpm2-tss@3.0.3-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=tpm2-tss-3.0.3-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-22745), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/python3-requests@2.25.1-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-requests-2.25.1-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-32681, CVE-2024-35195, CVE-2024-47081), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libgomp@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/file-libs@5.39-12.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=file-5.39-12.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2022-48554), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-4641), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-devel@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-headers@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/kernel-headers@5.14.0-284.11.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=kernel-5.14.0-284.11.1.el9_2.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2022-50616, CVE-2024-56614, CVE-2024-56615, CVE-2025-21883, CVE-2025-21928, CVE-2025-21929, CVE-2025-21991, CVE-2025-22085, CVE-2021-47383, CVE-2025-21759, CVE-2023-28746, CVE-2023-6356, CVE-2023-6535, CVE-2023-6536, CVE-2024-21823, CVE-2025-21999, CVE-2025-38350, CVE-2024-46695, CVE-2024-50275, CVE-2024-42292, CVE-2024-50302, CVE-2022-49395, CVE-2023-5090, CVE-2024-26664, CVE-2024-50264, CVE-2025-38110, CVE-2024-53122, CVE-2024-53197, CVE-2024-36941, CVE-2024-38627, CVE-2022-50042, CVE-2023-1074, CVE-2023-45862, CVE-2023-52490, CVE-2023-52658, CVE-2023-53597, CVE-2023-53704, CVE-2023-54004, CVE-2023-54093, CVE-2023-54271, CVE-2023-7192, CVE-2024-0443, CVE-2024-26615, CVE-2024-26878, CVE-2024-27046, CVE-2024-27052, CVE-2024-35789, CVE-2024-35852, CVE-2024-35890, CVE-2024-35907, CVE-2024-35952, CVE-2024-35989, CVE-2024-39483, CVE-2024-40959, CVE-2024-41035, CVE-2024-41064, CVE-2024-42079, CVE-2024-42272, CVE-2024-42283, CVE-2024-42322, CVE-2024-43854, CVE-2024-44990, CVE-2024-44994, CVE-2024-45018, CVE-2024-46713, CVE-2024-46824, CVE-2024-49949, CVE-2024-50208, CVE-2024-50251, CVE-2024-50252, CVE-2024-53113, CVE-2025-21669, CVE-2025-21962, CVE-2025-21963, CVE-2025-21964, CVE-2025-37785, CVE-2025-38234, CVE-2023-52448, CVE-2023-53755, CVE-2024-47745, CVE-2024-53088, CVE-2025-21961, CVE-2025-22036, CVE-2025-38417, CVE-2023-52771, CVE-2023-52864, CVE-2024-26855, CVE-2024-35845, CVE-2024-36922, CVE-2024-38555, CVE-2024-38556, CVE-2024-43855, CVE-2024-46826, CVE-2024-26897, CVE-2024-38586), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libstdc%2B%2B-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/cpp@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/gcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libgomp@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2022-4285, CVE-2025-11082, CVE-2025-11083, CVE-2025-5244), pkg:rpm/redhat/binutils@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2022-4285, CVE-2025-11081, CVE-2025-11082, CVE-2025-11083, CVE-2025-11413, CVE-2025-5244), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-39615, CVE-2026-6732, CVE-2025-9714, CVE-2026-1757, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2026-0990, CVE-2025-32414, CVE-2025-26434), pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-39615, CVE-2025-9714, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2025-32414), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/libtiff-devel@4.4.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtiff-4.4.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2022-40090, CVE-2023-3618, CVE-2023-40745, CVE-2023-41175, CVE-2023-0795, CVE-2023-0796, CVE-2023-0797, CVE-2023-0798, CVE-2023-0800, CVE-2023-0801, CVE-2023-0802, CVE-2023-0803, CVE-2023-0804, CVE-2022-48281, CVE-2023-0799, CVE-2023-26965, CVE-2023-26966, CVE-2023-2731, CVE-2023-3316, CVE-2023-3576), pkg:rpm/redhat/libtiff@4.4.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtiff-4.4.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2022-40090, CVE-2023-3618, CVE-2023-40745, CVE-2023-41175, CVE-2023-0795, CVE-2023-0796, CVE-2023-0797, CVE-2023-0798, CVE-2023-0800, CVE-2023-0801, CVE-2023-0802, CVE-2023-0803, CVE-2023-0804, CVE-2022-48281, CVE-2023-0799, CVE-2023-26965, CVE-2023-26966, CVE-2023-2731, CVE-2023-3316, CVE-2023-3576, CVE-2025-61143, CVE-2025-61144, CVE-2025-61145), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2026-5713, CVE-2025-13837, CVE-2026-4224, CVE-2007-4559, CVE-2026-3644, CVE-2023-27043, CVE-2024-8088, CVE-2025-12781, CVE-2026-3446, CVE-2024-0397, CVE-2024-7592, CVE-2025-15282, CVE-2025-11468, CVE-2026-0865, CVE-2026-1502, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/freetype@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2026-23865), pkg:rpm/redhat/libX11-common@1.7.0-7.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-43785, CVE-2023-43786), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libX11-xcb@1.7.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-43785, CVE-2023-43786), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libX11-devel@1.7.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-43785, CVE-2023-43786), pkg:rpm/redhat/libX11@1.7.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-43785, CVE-2023-43786), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2025-14512, CVE-2023-29499, CVE-2025-14087, CVE-2025-4373), pkg:rpm/redhat/glib2-devel@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2023-29499, CVE-2025-4373), pkg:rpm/redhat/libpng@1.6.37-12.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=libpng-1.6.37-12.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2026-22801, CVE-2025-28162, CVE-2025-64506, CVE-2026-22695, CVE-2026-3713, CVE-2025-28164, CVE-2025-64505), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/harfbuzz@2.7.4-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=harfbuzz-2.7.4-8.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2026-22693), pkg:rpm/redhat/libpng-devel@1.6.37-12.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=libpng-1.6.37-12.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2026-22801, CVE-2026-22695), pkg:rpm/redhat/libmount-devel@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libblkid-devel@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgomp@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/libXpm@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-43788, CVE-2023-43789), pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-43788, CVE-2023-43789), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/bzip2-devel@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-26465, CVE-2023-51385, CVE-2023-48795, CVE-2025-61984, CVE-2025-61985, CVE-2026-35414, CVE-2025-32728), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2025-9231, CVE-2026-22796, CVE-2026-28388, CVE-2026-28389, CVE-2026-31790, CVE-2026-31789, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2026-28386, CVE-2025-69418), pkg:rpm/redhat/openssh@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-26465, CVE-2023-51385, CVE-2023-48795, CVE-2025-61984, CVE-2025-61985, CVE-2026-35414, CVE-2025-32728), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-27614, CVE-2024-52006, CVE-2025-27613), pkg:rpm/redhat/git-core@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-27614, CVE-2024-52006, CVE-2025-27613), pkg:rpm/redhat/perl-Git@2.39.3-1.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-27614, CVE-2024-52006, CVE-2025-27613), pkg:rpm/redhat/git-core-doc@2.39.3-1.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-27614, CVE-2024-52006, CVE-2025-27613), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/emacs-filesystem@27.2-8.el9_2.1?arch=noarch\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=emacs-27.2-8.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2024-30203, CVE-2024-30204), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/pam@1.5.1-14.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pam-1.5.1-14.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2024-22365, CVE-2024-10041), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/perl-mro@1.23-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Class-Struct@0.66-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-subs@1.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-interpreter@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overload@1.31-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-libs@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-lib@0.65-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-stat@1.09-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IO@1.43-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-Find@1.37-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-Basename@2.85-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-POSIX@1.94-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Symbol@1.08-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-SelectSaver@1.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Getopt-Std@1.12-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-vars@1.05-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-if@0.60.800-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Fcntl@1.13-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-DynaLoader@1.47-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IPC-Open3@1.21-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overloading@0.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Errno@1.30-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/libeconf@0.4.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libeconf-0.4.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2023-22652), pkg:rpm/redhat/perl-Storable@3.21-460.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=perl-Storable-3.21-460.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2017-20230), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libsmartcols@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/util-linux@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/util-linux-core@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libfdisk@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/systemd-libs@252-13.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-13.el9_2.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2023-7008, CVE-2025-4598), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2023-4641), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-pip@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pip@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pip@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pip@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pip@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pip@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pip@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2026-5713, CVE-2025-13837, CVE-2026-4224, CVE-2007-4559, CVE-2026-3644, CVE-2023-27043, CVE-2024-8088, CVE-2025-12781, CVE-2026-3446, CVE-2024-0397, CVE-2024-7592, CVE-2025-15282, CVE-2025-11468, CVE-2026-0865, CVE-2026-1502, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pip@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pip@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pip@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pip@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pip@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pip@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-pip@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pip@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pip@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pip@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-devel@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-headers@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/kernel-headers@5.14.0-284.11.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=kernel-5.14.0-284.11.1.el9_2.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2022-50616, CVE-2024-56614, CVE-2024-56615, CVE-2025-21883, CVE-2025-21928, CVE-2025-21929, CVE-2025-21991, CVE-2025-22085, CVE-2021-47383, CVE-2025-21759, CVE-2023-28746, CVE-2023-6356, CVE-2023-6535, CVE-2023-6536, CVE-2024-21823, CVE-2025-21999, CVE-2025-38350, CVE-2024-46695, CVE-2024-50275, CVE-2024-42292, CVE-2024-50302, CVE-2022-49395, CVE-2023-5090, CVE-2024-26664, CVE-2024-50264, CVE-2025-38110, CVE-2024-53122, CVE-2024-53197, CVE-2024-36941, CVE-2024-38627, CVE-2022-50042, CVE-2023-1074, CVE-2023-45862, CVE-2023-52490, CVE-2023-52658, CVE-2023-53597, CVE-2023-53704, CVE-2023-54004, CVE-2023-54093, CVE-2023-54271, CVE-2023-7192, CVE-2024-0443, CVE-2024-26615, CVE-2024-26878, CVE-2024-27046, CVE-2024-27052, CVE-2024-35789, CVE-2024-35852, CVE-2024-35890, CVE-2024-35907, CVE-2024-35952, CVE-2024-35989, CVE-2024-39483, CVE-2024-40959, CVE-2024-41035, CVE-2024-41064, CVE-2024-42079, CVE-2024-42272, CVE-2024-42283, CVE-2024-42322, CVE-2024-43854, CVE-2024-44990, CVE-2024-44994, CVE-2024-45018, CVE-2024-46713, CVE-2024-46824, CVE-2024-49949, CVE-2024-50208, CVE-2024-50251, CVE-2024-50252, CVE-2024-53113, CVE-2025-21669, CVE-2025-21962, CVE-2025-21963, CVE-2025-21964, CVE-2025-37785, CVE-2025-38234, CVE-2023-52448, CVE-2023-53755, CVE-2024-47745, CVE-2024-53088, CVE-2025-21961, CVE-2025-22036, CVE-2025-38417, CVE-2023-52771, CVE-2023-52864, CVE-2024-26855, CVE-2024-35845, CVE-2024-36922, CVE-2024-38555, CVE-2024-38556, CVE-2024-43855, CVE-2024-46826, CVE-2024-26897, CVE-2024-38586), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/cpp@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/gcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libquadmath@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libgfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libgomp@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2022-4285, CVE-2025-11082, CVE-2025-11083, CVE-2025-5244), pkg:rpm/redhat/binutils@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2022-4285, CVE-2025-11081, CVE-2025-11082, CVE-2025-11083, CVE-2025-11413, CVE-2025-5244), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2025-14512, CVE-2023-29499, CVE-2025-14087, CVE-2025-4373), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2021-3826), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2025-9231, CVE-2026-22796, CVE-2026-28388, CVE-2026-28389, CVE-2026-31790, CVE-2026-31789, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2026-28386, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/pam@1.5.1-14.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pam-1.5.1-14.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2024-22365, CVE-2024-10041), pkg:rpm/redhat/systemd@252-13.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-13.el9_2.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2026-40224, CVE-2026-4105, CVE-2026-40225, CVE-2026-40226, CVE-2023-7008, CVE-2026-40227, CVE-2025-4598, CVE-2026-40223), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/libeconf@0.4.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libeconf-0.4.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2023-22652), pkg:rpm/redhat/dbus-common@1.12.20-7.el9_1?arch=noarch\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2023-34969), pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2023-34969), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libsmartcols@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/util-linux@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libfdisk@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/util-linux-core@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/systemd-pam@252-13.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-13.el9_2.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2023-7008, CVE-2025-4598), pkg:rpm/redhat/systemd-rpm-macros@252-13.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=systemd-252-13.el9_2.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2023-7008, CVE-2025-4598), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/systemd-libs@252-13.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-13.el9_2.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2023-7008, CVE-2025-4598), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2023-4641), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.15-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-ethtool-0.15-2.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.15-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-ethtool-0.15-2.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.15-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-ethtool-0.15-2.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.15-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-ethtool-0.15-2.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.15-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-ethtool-0.15-2.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.15-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-ethtool-0.15-2.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.15-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-ethtool-0.15-2.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2026-5713, CVE-2025-13837, CVE-2026-4224, CVE-2007-4559, CVE-2026-3644, CVE-2023-27043, CVE-2024-8088, CVE-2025-12781, CVE-2026-3446, CVE-2024-0397, CVE-2024-7592, CVE-2025-15282, CVE-2025-11468, CVE-2026-0865, CVE-2026-1502, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.15-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-ethtool-0.15-2.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.15-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-ethtool-0.15-2.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.15-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-ethtool-0.15-2.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.15-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-ethtool-0.15-2.el9.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.15-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-ethtool-0.15-2.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.15-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-ethtool-0.15-2.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.15-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-ethtool-0.15-2.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.15-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-ethtool-0.15-2.el9.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.15-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-ethtool-0.15-2.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.15-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-ethtool-0.15-2.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/libkadm5@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/libkadm5@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libkadm5@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libkadm5@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libkadm5@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libkadm5@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libkadm5@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/libkadm5@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libkadm5@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/libkadm5@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/libkadm5@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/libkadm5@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/libkadm5@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-39615, CVE-2026-6732, CVE-2025-9714, CVE-2026-1757, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2026-0990, CVE-2025-32414, CVE-2025-26434), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2026-5713, CVE-2025-13837, CVE-2026-4224, CVE-2007-4559, CVE-2026-3644, CVE-2023-27043, CVE-2024-8088, CVE-2025-12781, CVE-2026-3446, CVE-2024-0397, CVE-2024-7592, CVE-2025-15282, CVE-2025-11468, CVE-2026-0865, CVE-2026-1502, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/libcomps@0.1.18-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcomps-0.1.18-1.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2024-28863, CVE-2026-4324), pkg:rpm/redhat/python3-libcomps@0.1.18-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcomps-0.1.18-1.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2024-28863, CVE-2026-4324), pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2025-68972), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2025-60753, CVE-2024-57970, CVE-2025-25724), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2025-14512, CVE-2023-29499, CVE-2025-14087, CVE-2025-4373), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/rpm-sign-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm-build-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/python3-rpm@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/tpm2-tss@3.0.3-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=tpm2-tss-3.0.3-8.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-22745), pkg:rpm/redhat/dbus-libs@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-34969), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libsmartcols@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libgomp@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/systemd-libs@252-13.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-13.el9_2.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-7008, CVE-2025-4598), pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/file-libs@5.39-12.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=file-5.39-12.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2022-48554), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-4641), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2026-5713, CVE-2025-13837, CVE-2026-4224, CVE-2007-4559, CVE-2026-3644, CVE-2023-27043, CVE-2024-8088, CVE-2025-12781, CVE-2026-3446, CVE-2024-0397, CVE-2024-7592, CVE-2025-15282, CVE-2025-11468, CVE-2026-0865, CVE-2026-1502, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/python3-idna@2.10-7.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-idna-2.10-7.el9.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2024-3651), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-38709, CVE-2025-65082, CVE-2025-66200, CVE-2024-38473, CVE-2024-24795), pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-38709, CVE-2025-65082, CVE-2025-66200, CVE-2024-38473, CVE-2024-24795), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/httpd-filesystem@2.4.53-11.el9_2.5?arch=noarch\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm [transitive via pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-38709, CVE-2025-65082, CVE-2025-66200, CVE-2024-38473, CVE-2024-24795), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/apr@1.7.0-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-1.7.0-11.el9.src.rpm [transitive via pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2022-24963), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-4641), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/sscg@3.0.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sscg-3.0.0-7.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/sscg@3.0.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sscg-3.0.0-7.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/sscg@3.0.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sscg-3.0.0-7.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/sscg@3.0.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sscg-3.0.0-7.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/sscg@3.0.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sscg-3.0.0-7.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/sscg@3.0.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sscg-3.0.0-7.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/sscg@3.0.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sscg-3.0.0-7.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/sscg@3.0.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sscg-3.0.0-7.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/sscg@3.0.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sscg-3.0.0-7.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/sscg@3.0.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sscg-3.0.0-7.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/sscg@3.0.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sscg-3.0.0-7.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/krb5-devel@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libkadm5@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/krb5-devel@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/krb5-devel@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/krb5-devel@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/krb5-devel@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/krb5-devel@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/krb5-devel@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/krb5-devel@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/krb5-devel@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/krb5-devel@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/krb5-devel@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/krb5-devel@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/krb5-devel@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/krb5-devel@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-inotify@0.9.6-25.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-inotify-0.9.6-25.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-inotify@0.9.6-25.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-inotify-0.9.6-25.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-inotify@0.9.6-25.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-inotify-0.9.6-25.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-inotify@0.9.6-25.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-inotify-0.9.6-25.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/python3-inotify@0.9.6-25.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-inotify-0.9.6-25.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-inotify@0.9.6-25.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-inotify-0.9.6-25.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-inotify@0.9.6-25.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-inotify-0.9.6-25.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2026-5713, CVE-2025-13837, CVE-2026-4224, CVE-2007-4559, CVE-2026-3644, CVE-2023-27043, CVE-2024-8088, CVE-2025-12781, CVE-2026-3446, CVE-2024-0397, CVE-2024-7592, CVE-2025-15282, CVE-2025-11468, CVE-2026-0865, CVE-2026-1502, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-inotify@0.9.6-25.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-inotify-0.9.6-25.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-inotify@0.9.6-25.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-inotify-0.9.6-25.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-inotify@0.9.6-25.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-inotify-0.9.6-25.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-inotify@0.9.6-25.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-inotify-0.9.6-25.el9.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/python3-inotify@0.9.6-25.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-inotify-0.9.6-25.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-inotify@0.9.6-25.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-inotify-0.9.6-25.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-inotify@0.9.6-25.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-inotify-0.9.6-25.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-inotify@0.9.6-25.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-inotify-0.9.6-25.el9.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/python3-inotify@0.9.6-25.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-inotify-0.9.6-25.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-inotify@0.9.6-25.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-inotify-0.9.6-25.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-39615, CVE-2026-6732, CVE-2025-9714, CVE-2026-1757, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2026-0990, CVE-2025-32414, CVE-2025-26434), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2026-5713, CVE-2025-13837, CVE-2026-4224, CVE-2007-4559, CVE-2026-3644, CVE-2023-27043, CVE-2024-8088, CVE-2025-12781, CVE-2026-3446, CVE-2024-0397, CVE-2024-7592, CVE-2025-15282, CVE-2025-11468, CVE-2026-0865, CVE-2026-1502, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/libcomps@0.1.18-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcomps-0.1.18-1.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-28863, CVE-2026-4324), pkg:rpm/redhat/python3-libcomps@0.1.18-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcomps-0.1.18-1.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-28863, CVE-2026-4324), pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2025-68972), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2025-60753, CVE-2024-57970, CVE-2025-25724), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2025-14512, CVE-2023-29499, CVE-2025-14087, CVE-2025-4373), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/rpm-sign-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm-build-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/python3-rpm@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/tpm2-tss@3.0.3-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=tpm2-tss-3.0.3-8.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-22745), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libsmartcols@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libgomp@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/file-libs@5.39-12.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=file-5.39-12.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2022-48554), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-4641), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm] (CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2025-9231, CVE-2026-22796, CVE-2026-28388, CVE-2026-28389, CVE-2026-31790, CVE-2026-31789, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2026-28386, CVE-2025-69418), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-39615, CVE-2026-6732, CVE-2025-9714, CVE-2026-1757, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2026-0990, CVE-2025-32414, CVE-2025-26434), pkg:rpm/redhat/krb5-libs@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2026-5713, CVE-2025-13837, CVE-2026-4224, CVE-2007-4559, CVE-2026-3644, CVE-2023-27043, CVE-2024-8088, CVE-2025-12781, CVE-2026-3446, CVE-2024-0397, CVE-2024-7592, CVE-2025-15282, CVE-2025-11468, CVE-2026-0865, CVE-2026-1502, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/libcomps@0.1.18-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcomps-0.1.18-1.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-28863, CVE-2026-4324), pkg:rpm/redhat/python3-libcomps@0.1.18-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcomps-0.1.18-1.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-28863, CVE-2026-4324), pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2025-68972), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/pam@1.5.1-14.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pam-1.5.1-14.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-22365, CVE-2024-10041), pkg:rpm/redhat/systemd@252-13.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-13.el9_2.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2026-40224, CVE-2026-4105, CVE-2026-40225, CVE-2026-40226, CVE-2023-7008, CVE-2026-40227, CVE-2025-4598, CVE-2026-40223), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2025-60753, CVE-2024-57970, CVE-2025-25724), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2025-14512, CVE-2023-29499, CVE-2025-14087, CVE-2025-4373), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/libeconf@0.4.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libeconf-0.4.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-22652), pkg:rpm/redhat/rpm-sign-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm-build-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/python3-rpm@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/python3-decorator@4.4.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-decorator-4.4.2-6.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-2727, CVE-2023-2728), pkg:rpm/redhat/tpm2-tss@3.0.3-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=tpm2-tss-3.0.3-8.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-22745), pkg:rpm/redhat/dbus-libs@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-34969), pkg:rpm/redhat/dbus-common@1.12.20-7.el9_1?arch=noarch\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-34969), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-34969), pkg:rpm/redhat/libsmartcols@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/util-linux@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/python3-requests@2.25.1-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-requests-2.25.1-6.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-32681, CVE-2024-35195, CVE-2024-47081), pkg:rpm/redhat/util-linux-core@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libfdisk@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libgomp@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/systemd-pam@252-13.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-13.el9_2.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-7008, CVE-2025-4598), pkg:rpm/redhat/systemd-rpm-macros@252-13.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=systemd-252-13.el9_2.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-7008, CVE-2025-4598), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/systemd-libs@252-13.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-13.el9_2.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-7008, CVE-2025-4598), pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/file-libs@5.39-12.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=file-5.39-12.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2022-48554), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-4641), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-39615, CVE-2026-6732, CVE-2025-9714, CVE-2026-1757, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2026-0990, CVE-2025-32414, CVE-2025-26434), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/libtiff@4.4.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtiff-4.4.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2022-40090, CVE-2023-3618, CVE-2023-40745, CVE-2023-41175, CVE-2023-0795, CVE-2023-0796, CVE-2023-0797, CVE-2023-0798, CVE-2023-0800, CVE-2023-0801, CVE-2023-0802, CVE-2023-0803, CVE-2023-0804, CVE-2022-48281, CVE-2023-0799, CVE-2023-26965, CVE-2023-26966, CVE-2023-2731, CVE-2023-3316, CVE-2023-3576, CVE-2025-61143, CVE-2025-61144, CVE-2025-61145), pkg:rpm/redhat/freetype@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2026-23865), pkg:rpm/redhat/libX11-common@1.7.0-7.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-43785, CVE-2023-43786), pkg:rpm/redhat/libX11@1.7.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-43785, CVE-2023-43786), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2025-14512, CVE-2023-29499, CVE-2025-14087, CVE-2025-4373), pkg:rpm/redhat/libpng@1.6.37-12.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=libpng-1.6.37-12.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2026-22801, CVE-2025-28162, CVE-2025-64506, CVE-2026-22695, CVE-2026-3713, CVE-2025-28164, CVE-2025-64505), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/harfbuzz@2.7.4-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=harfbuzz-2.7.4-8.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2026-22693), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/libXpm@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-43788, CVE-2023-43789), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2023-39615, CVE-2026-6732, CVE-2025-9714, CVE-2026-1757, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2026-0990, CVE-2025-32414, CVE-2025-26434), pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2023-39615, CVE-2025-9714, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2025-32414), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libxslt@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxslt-1.1.34-9.el9.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2023-40403, CVE-2025-10911), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/perl-POSIX@1.94-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Symbol@1.08-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-mro@1.23-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-SelectSaver@1.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Getopt-Std@1.12-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Class-Struct@0.66-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-subs@1.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-vars@1.05-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-interpreter@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overload@1.31-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-libs@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-if@0.60.800-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-stat@1.09-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Fcntl@1.13-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IO@1.43-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-Basename@2.85-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IPC-Open3@1.21-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overloading@0.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Errno@1.30-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Storable@3.21-460.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=perl-Storable-3.21-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2017-20230), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/xml-common@0.6.3-58.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=sgml-common-0.6.3-58.el9.src.rpm] (CVE-2023-39615, CVE-2026-6732, CVE-2025-9714, CVE-2026-1757, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2026-0990, CVE-2025-32414, CVE-2025-26434), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/xml-common@0.6.3-58.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=sgml-common-0.6.3-58.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/xml-common@0.6.3-58.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=sgml-common-0.6.3-58.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/xml-common@0.6.3-58.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=sgml-common-0.6.3-58.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/xml-common@0.6.3-58.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=sgml-common-0.6.3-58.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/xml-common@0.6.3-58.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=sgml-common-0.6.3-58.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/xml-common@0.6.3-58.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=sgml-common-0.6.3-58.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/xml-common@0.6.3-58.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=sgml-common-0.6.3-58.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm] (CVE-2023-39615, CVE-2026-6732, CVE-2025-9714, CVE-2026-1757, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2026-0990, CVE-2025-32414, CVE-2025-26434), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/json-c@0.14-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-c-0.14-11.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/json-c@0.14-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-c-0.14-11.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/json-c@0.14-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-c-0.14-11.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/json-c@0.14-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-c-0.14-11.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/json-c@0.14-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-c-0.14-11.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/json-c@0.14-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-c-0.14-11.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/json-c@0.14-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-c-0.14-11.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/sqlite@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/sqlite@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/sqlite@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/sqlite@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/sqlite@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/sqlite@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/sqlite@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/atlas-devel@3.10.3-17.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=atlas-3.10.3-17.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/atlas-devel@3.10.3-17.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=atlas-3.10.3-17.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/atlas-devel@3.10.3-17.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=atlas-3.10.3-17.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/atlas-devel@3.10.3-17.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=atlas-3.10.3-17.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/atlas-devel@3.10.3-17.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=atlas-3.10.3-17.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/atlas-devel@3.10.3-17.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=atlas-3.10.3-17.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libquadmath@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/atlas-devel@3.10.3-17.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=atlas-3.10.3-17.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/atlas-devel@3.10.3-17.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=atlas-3.10.3-17.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libgfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/atlas-devel@3.10.3-17.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=atlas-3.10.3-17.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libicu-devel@67.1-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=icu-67.1-9.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libicu-devel@67.1-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=icu-67.1-9.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libicu-devel@67.1-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=icu-67.1-9.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libicu-devel@67.1-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=icu-67.1-9.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libicu-devel@67.1-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=icu-67.1-9.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libicu-devel@67.1-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=icu-67.1-9.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/libicu-devel@67.1-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=icu-67.1-9.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/libicu-devel@67.1-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=icu-67.1-9.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-locale-source@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-locale-source@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-locale-source@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-locale-source@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-locale-source@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-locale-source@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-locale-source@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/perl-POSIX@1.94-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Symbol@1.08-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-mro@1.23-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-SelectSaver@1.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Getopt-Std@1.12-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Class-Struct@0.66-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-subs@1.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-vars@1.05-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-interpreter@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overload@1.31-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-libs@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-if@0.60.800-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-stat@1.09-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Fcntl@1.13-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IO@1.43-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-Basename@2.85-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-base@2.27-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IPC-Open3@1.21-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Errno@1.30-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overloading@0.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Storable@3.21-460.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=perl-Storable-3.21-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2017-20230), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-IP@0.41-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-IP-0.41-5.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/hunspell-en-US@0.20140811.1-20.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=hunspell-en-0.20140811.1-20.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/hunspell-en-US@0.20140811.1-20.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=hunspell-en-0.20140811.1-20.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/hunspell-en-US@0.20140811.1-20.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=hunspell-en-0.20140811.1-20.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/hunspell-en-US@0.20140811.1-20.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=hunspell-en-0.20140811.1-20.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/hunspell-en-US@0.20140811.1-20.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=hunspell-en-0.20140811.1-20.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/hunspell-en-US@0.20140811.1-20.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=hunspell-en-0.20140811.1-20.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/hunspell-en-US@0.20140811.1-20.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=hunspell-en-0.20140811.1-20.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/hunspell-en-US@0.20140811.1-20.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=hunspell-en-0.20140811.1-20.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/pcre-cpp@8.44-3.el9.3?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pcre-8.44-3.el9.3.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/pcre-cpp@8.44-3.el9.3?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pcre-8.44-3.el9.3.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/pcre-cpp@8.44-3.el9.3?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pcre-8.44-3.el9.3.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/pcre-cpp@8.44-3.el9.3?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pcre-8.44-3.el9.3.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/pcre-cpp@8.44-3.el9.3?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pcre-8.44-3.el9.3.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/pcre-cpp@8.44-3.el9.3?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pcre-8.44-3.el9.3.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/pcre-cpp@8.44-3.el9.3?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pcre-8.44-3.el9.3.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/pcre-cpp@8.44-3.el9.3?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pcre-8.44-3.el9.3.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/perl-POSIX@1.94-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Symbol@1.08-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-mro@1.23-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-SelectSaver@1.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Getopt-Std@1.12-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Class-Struct@0.66-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-subs@1.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-vars@1.05-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-interpreter@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overload@1.31-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-libs@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-if@0.60.800-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-stat@1.09-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Fcntl@1.13-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IO@1.43-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-Basename@2.85-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IPC-Open3@1.21-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Errno@1.30-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overloading@0.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Storable@3.21-460.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=perl-Storable-3.21-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2017-20230), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Digest-1.19-4.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/apr-devel@1.7.0-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-1.7.0-11.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/apr-devel@1.7.0-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-1.7.0-11.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/apr-devel@1.7.0-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-1.7.0-11.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/apr-devel@1.7.0-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-1.7.0-11.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/apr-devel@1.7.0-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-1.7.0-11.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/apr-devel@1.7.0-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-1.7.0-11.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/apr@1.7.0-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-1.7.0-11.el9.src.rpm [transitive via pkg:rpm/redhat/apr-devel@1.7.0-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-1.7.0-11.el9.src.rpm] (CVE-2022-24963), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/apr-devel@1.7.0-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-1.7.0-11.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/apr-devel@1.7.0-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-1.7.0-11.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libstdc%2B%2B-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libstdc%2B%2B-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libstdc%2B%2B-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libstdc%2B%2B-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libstdc%2B%2B-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libstdc%2B%2B-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/libstdc%2B%2B-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/libstdc%2B%2B-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/xz@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/xz@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/xz@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/xz@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/xz@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/xz@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/xz@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper-libs@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper-libs@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper-libs@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper-libs@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper-libs@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper-libs@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper-libs@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/perl-POSIX@1.94-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Symbol@1.08-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-mro@1.23-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-SelectSaver@1.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Getopt-Std@1.12-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Class-Struct@0.66-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-subs@1.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-vars@1.05-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-interpreter@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overload@1.31-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-libs@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-if@0.60.800-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-stat@1.09-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Fcntl@1.13-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IO@1.43-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-Basename@2.85-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IPC-Open3@1.21-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Errno@1.30-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overloading@0.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Storable@3.21-460.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=perl-Storable-3.21-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2017-20230), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/perl-FileHandle@2.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/emacs-filesystem@27.2-8.el9_2.1?arch=noarch\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=emacs-27.2-8.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-30203, CVE-2024-30204), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/perl-POSIX@1.94-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Symbol@1.08-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-mro@1.23-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-SelectSaver@1.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Getopt-Std@1.12-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Class-Struct@0.66-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-subs@1.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-Compare@1.100.600-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-vars@1.05-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-interpreter@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overload@1.31-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-libs@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-B@1.80-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-if@0.60.800-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-stat@1.09-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Fcntl@1.13-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IO@1.43-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-Find@1.37-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-Basename@2.85-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-DynaLoader@1.47-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IPC-Open3@1.21-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Errno@1.30-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overloading@0.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Storable@3.21-460.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=perl-Storable-3.21-460.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2017-20230), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libdb-devel@5.3.28-53.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdb-5.3.28-53.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libdb-devel@5.3.28-53.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdb-5.3.28-53.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libdb-devel@5.3.28-53.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdb-5.3.28-53.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libdb-devel@5.3.28-53.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdb-5.3.28-53.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libdb-devel@5.3.28-53.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdb-5.3.28-53.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libdb-devel@5.3.28-53.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdb-5.3.28-53.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/libdb-devel@5.3.28-53.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdb-5.3.28-53.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/file@5.39-12.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=file-5.39-12.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/file@5.39-12.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=file-5.39-12.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/file@5.39-12.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=file-5.39-12.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/file@5.39-12.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=file-5.39-12.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/file@5.39-12.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=file-5.39-12.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/file@5.39-12.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=file-5.39-12.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/file@5.39-12.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=file-5.39-12.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/file-libs@5.39-12.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=file-5.39-12.el9.src.rpm [transitive via pkg:rpm/redhat/file@5.39-12.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=file-5.39-12.el9.src.rpm] (CVE-2022-48554), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libverto-devel@0.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libverto-0.3.2-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libverto-devel@0.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libverto-0.3.2-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libverto-devel@0.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libverto-0.3.2-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libverto-devel@0.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libverto-0.3.2-3.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libverto-devel@0.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libverto-0.3.2-3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libverto-devel@0.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libverto-0.3.2-3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/libverto-devel@0.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libverto-0.3.2-3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/patch@2.7.6-16.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=patch-2.7.6-16.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/patch@2.7.6-16.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=patch-2.7.6-16.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/patch@2.7.6-16.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=patch-2.7.6-16.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/patch@2.7.6-16.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=patch-2.7.6-16.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/patch@2.7.6-16.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=patch-2.7.6-16.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/patch@2.7.6-16.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=patch-2.7.6-16.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/patch@2.7.6-16.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=patch-2.7.6-16.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-headers@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-headers@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-headers@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-headers@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-headers@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-headers@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-headers@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/wget@1.21.1-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=wget-1.21.1-7.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/wget@1.21.1-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=wget-1.21.1-7.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/wget@1.21.1-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=wget-1.21.1-7.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/wget@1.21.1-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=wget-1.21.1-7.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/wget@1.21.1-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=wget-1.21.1-7.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/wget@1.21.1-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=wget-1.21.1-7.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/wget@1.21.1-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=wget-1.21.1-7.el9.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/wget@1.21.1-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=wget-1.21.1-7.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/wget@1.21.1-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=wget-1.21.1-7.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/wget@1.21.1-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=wget-1.21.1-7.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/wget@1.21.1-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=wget-1.21.1-7.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/perl-POSIX@1.94-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Symbol@1.08-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-mro@1.23-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-SelectSaver@1.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Getopt-Std@1.12-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Class-Struct@0.66-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-subs@1.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-vars@1.05-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-interpreter@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overload@1.31-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-libs@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-if@0.60.800-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-stat@1.09-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Fcntl@1.13-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IO@1.43-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-Basename@2.85-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IPC-Open3@1.21-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overloading@0.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Errno@1.30-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Storable@3.21-460.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=perl-Storable-3.21-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2017-20230), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/bzip2@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/bzip2@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/bzip2@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/bzip2@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/bzip2@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/bzip2@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/bzip2@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/bzip2@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libgpg-error-devel@1.42-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgpg-error-1.42-5.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libgpg-error-devel@1.42-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgpg-error-1.42-5.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libgpg-error-devel@1.42-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgpg-error-1.42-5.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libgpg-error-devel@1.42-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgpg-error-1.42-5.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libgpg-error-devel@1.42-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgpg-error-1.42-5.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libgpg-error-devel@1.42-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgpg-error-1.42-5.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/libgpg-error-devel@1.42-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgpg-error-1.42-5.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libpsl@0.21.1-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpsl-0.21.1-5.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libpsl@0.21.1-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpsl-0.21.1-5.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libpsl@0.21.1-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpsl-0.21.1-5.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libpsl@0.21.1-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpsl-0.21.1-5.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libpsl@0.21.1-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpsl-0.21.1-5.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libpsl@0.21.1-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpsl-0.21.1-5.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/libpsl@0.21.1-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpsl-0.21.1-5.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libtool-ltdl@2.4.6-45.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtool-2.4.6-45.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libtool-ltdl@2.4.6-45.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtool-2.4.6-45.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libtool-ltdl@2.4.6-45.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtool-2.4.6-45.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libtool-ltdl@2.4.6-45.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtool-2.4.6-45.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libtool-ltdl@2.4.6-45.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtool-2.4.6-45.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libtool-ltdl@2.4.6-45.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtool-2.4.6-45.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/libtool-ltdl@2.4.6-45.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtool-2.4.6-45.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/perl-POSIX@1.94-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Symbol@1.08-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-mro@1.23-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-SelectSaver@1.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Getopt-Std@1.12-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Class-Struct@0.66-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-subs@1.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-vars@1.05-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-interpreter@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overload@1.31-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-libs@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-if@0.60.800-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-stat@1.09-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Fcntl@1.13-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IO@1.43-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-Basename@2.85-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IPC-Open3@1.21-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Errno@1.30-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overloading@0.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Storable@3.21-460.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=perl-Storable-3.21-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2017-20230), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/perl-POSIX@1.94-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Symbol@1.08-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-mro@1.23-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-SelectSaver@1.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Getopt-Std@1.12-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Class-Struct@0.66-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-subs@1.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-vars@1.05-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-interpreter@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overload@1.31-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-libs@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-if@0.60.800-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-stat@1.09-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Fcntl@1.13-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IO@1.43-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-Basename@2.85-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IPC-Open3@1.21-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Errno@1.30-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overloading@0.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Storable@3.21-460.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=perl-Storable-3.21-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2017-20230), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Thread-Queue@3.14-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Thread-Queue-3.14-460.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-gdbserver@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-gdbserver@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-gdbserver@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-gdbserver@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-gdbserver@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-gdbserver@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-gdbserver@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-gdbserver@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libipt@2.0.4-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libipt-2.0.4-5.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libipt@2.0.4-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libipt-2.0.4-5.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libipt@2.0.4-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libipt-2.0.4-5.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libipt@2.0.4-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libipt-2.0.4-5.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libipt@2.0.4-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libipt-2.0.4-5.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libipt@2.0.4-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libipt-2.0.4-5.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/libipt@2.0.4-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libipt-2.0.4-5.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libcom_err-devel@1.46.5-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=e2fsprogs-1.46.5-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libcom_err-devel@1.46.5-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=e2fsprogs-1.46.5-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libcom_err-devel@1.46.5-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=e2fsprogs-1.46.5-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libcom_err-devel@1.46.5-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=e2fsprogs-1.46.5-3.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libcom_err-devel@1.46.5-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=e2fsprogs-1.46.5-3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libcom_err-devel@1.46.5-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=e2fsprogs-1.46.5-3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/libcom_err-devel@1.46.5-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=e2fsprogs-1.46.5-3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libxcrypt-compat@4.4.18-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxcrypt-4.4.18-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libxcrypt-compat@4.4.18-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxcrypt-4.4.18-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libxcrypt-compat@4.4.18-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxcrypt-4.4.18-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libxcrypt-compat@4.4.18-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxcrypt-4.4.18-3.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libxcrypt-compat@4.4.18-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxcrypt-4.4.18-3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libxcrypt-compat@4.4.18-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxcrypt-4.4.18-3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/libxcrypt-compat@4.4.18-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxcrypt-4.4.18-3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libpath_utils@0.2.1-53.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ding-libs-0.6.1-53.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libpath_utils@0.2.1-53.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ding-libs-0.6.1-53.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libpath_utils@0.2.1-53.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ding-libs-0.6.1-53.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libpath_utils@0.2.1-53.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ding-libs-0.6.1-53.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libpath_utils@0.2.1-53.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ding-libs-0.6.1-53.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libpath_utils@0.2.1-53.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ding-libs-0.6.1-53.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/libpath_utils@0.2.1-53.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ding-libs-0.6.1-53.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/boost-regex@1.75.0-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=boost-1.75.0-8.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/boost-regex@1.75.0-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=boost-1.75.0-8.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/boost-regex@1.75.0-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=boost-1.75.0-8.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/boost-regex@1.75.0-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=boost-1.75.0-8.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/boost-regex@1.75.0-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=boost-1.75.0-8.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/boost-regex@1.75.0-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=boost-1.75.0-8.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/boost-regex@1.75.0-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=boost-1.75.0-8.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/boost-regex@1.75.0-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=boost-1.75.0-8.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/xorg-x11-proto-devel@2021.4-2.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=xorg-x11-proto-devel-2021.4-2.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/xorg-x11-proto-devel@2021.4-2.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=xorg-x11-proto-devel-2021.4-2.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/xorg-x11-proto-devel@2021.4-2.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=xorg-x11-proto-devel-2021.4-2.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/xorg-x11-proto-devel@2021.4-2.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=xorg-x11-proto-devel-2021.4-2.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/xorg-x11-proto-devel@2021.4-2.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=xorg-x11-proto-devel-2021.4-2.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/xorg-x11-proto-devel@2021.4-2.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=xorg-x11-proto-devel-2021.4-2.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/xorg-x11-proto-devel@2021.4-2.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=xorg-x11-proto-devel-2021.4-2.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libtalloc@2.3.4-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtalloc-2.3.4-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libtalloc@2.3.4-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtalloc-2.3.4-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libtalloc@2.3.4-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtalloc-2.3.4-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libtalloc@2.3.4-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtalloc-2.3.4-1.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libtalloc@2.3.4-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtalloc-2.3.4-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libtalloc@2.3.4-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtalloc-2.3.4-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/libtalloc@2.3.4-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtalloc-2.3.4-1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/m4@1.4.19-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=m4-1.4.19-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/m4@1.4.19-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=m4-1.4.19-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/m4@1.4.19-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=m4-1.4.19-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/m4@1.4.19-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=m4-1.4.19-1.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/m4@1.4.19-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=m4-1.4.19-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/m4@1.4.19-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=m4-1.4.19-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/m4@1.4.19-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=m4-1.4.19-1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/libX11-devel@1.7.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2023-43785, CVE-2023-43786), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libX11-xcb@1.7.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2023-43785, CVE-2023-43786), pkg:rpm/redhat/libX11-common@1.7.0-7.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2023-43785, CVE-2023-43786), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libX11@1.7.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2023-43785, CVE-2023-43786), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libXpm@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2023-43788, CVE-2023-43789), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/source-highlight@3.1.9-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=source-highlight-3.1.9-11.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/source-highlight@3.1.9-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=source-highlight-3.1.9-11.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/source-highlight@3.1.9-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=source-highlight-3.1.9-11.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/source-highlight@3.1.9-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=source-highlight-3.1.9-11.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/source-highlight@3.1.9-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=source-highlight-3.1.9-11.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/source-highlight@3.1.9-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=source-highlight-3.1.9-11.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/source-highlight@3.1.9-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=source-highlight-3.1.9-11.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/source-highlight@3.1.9-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=source-highlight-3.1.9-11.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-31.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=rootfiles-8.1-31.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-31.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=rootfiles-8.1-31.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-31.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=rootfiles-8.1-31.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-31.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=rootfiles-8.1-31.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-31.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=rootfiles-8.1-31.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-31.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=rootfiles-8.1-31.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-31.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=rootfiles-8.1-31.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/hostname@3.23-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=hostname-3.23-6.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/hostname@3.23-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=hostname-3.23-6.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/hostname@3.23-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=hostname-3.23-6.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/hostname@3.23-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=hostname-3.23-6.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/hostname@3.23-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=hostname-3.23-6.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/hostname@3.23-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=hostname-3.23-6.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/hostname@3.23-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=hostname-3.23-6.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/enchant@1.6.0-30.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=enchant-1.6.0-30.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/enchant@1.6.0-30.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=enchant-1.6.0-30.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/enchant@1.6.0-30.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=enchant-1.6.0-30.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/enchant@1.6.0-30.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=enchant-1.6.0-30.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/enchant@1.6.0-30.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=enchant-1.6.0-30.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/enchant@1.6.0-30.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=enchant-1.6.0-30.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/enchant@1.6.0-30.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=enchant-1.6.0-30.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/enchant@1.6.0-30.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=enchant-1.6.0-30.el9.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2025-14512, CVE-2023-29499, CVE-2025-14087, CVE-2025-4373), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/enchant@1.6.0-30.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=enchant-1.6.0-30.el9.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/enchant@1.6.0-30.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=enchant-1.6.0-30.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/enchant@1.6.0-30.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=enchant-1.6.0-30.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/enchant@1.6.0-30.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=enchant-1.6.0-30.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/enchant@1.6.0-30.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=enchant-1.6.0-30.el9.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/enchant@1.6.0-30.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=enchant-1.6.0-30.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/enchant@1.6.0-30.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=enchant-1.6.0-30.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/enchant@1.6.0-30.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=enchant-1.6.0-30.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/sqlite-devel@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/sqlite-devel@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/sqlite-devel@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/sqlite-devel@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/sqlite-devel@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/sqlite-devel@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/sqlite-devel@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/dmidecode@3.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dmidecode-3.3-7.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/dmidecode@3.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dmidecode-3.3-7.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/dmidecode@3.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dmidecode-3.3-7.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/dmidecode@3.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dmidecode-3.3-7.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/dmidecode@3.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dmidecode-3.3-7.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/dmidecode@3.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dmidecode-3.3-7.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/dmidecode@3.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dmidecode-3.3-7.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/emacs-filesystem@27.2-8.el9_2.1?arch=noarch\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=emacs-27.2-8.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-30203, CVE-2024-30204), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/perl-POSIX@1.94-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Symbol@1.08-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-mro@1.23-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-SelectSaver@1.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Getopt-Std@1.12-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Class-Struct@0.66-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-subs@1.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-Compare@1.100.600-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-vars@1.05-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-interpreter@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overload@1.31-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-libs@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-B@1.80-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-if@0.60.800-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-stat@1.09-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Fcntl@1.13-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IO@1.43-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-Copy@2.34-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-Find@1.37-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-Basename@2.85-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-DynaLoader@1.47-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IPC-Open3@1.21-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Errno@1.30-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overloading@0.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Storable@3.21-460.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=perl-Storable-3.21-460.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2017-20230), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/keyutils-libs-devel@1.6.3-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=keyutils-1.6.3-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/keyutils-libs-devel@1.6.3-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=keyutils-1.6.3-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/keyutils-libs-devel@1.6.3-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=keyutils-1.6.3-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/keyutils-libs-devel@1.6.3-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=keyutils-1.6.3-1.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/keyutils-libs-devel@1.6.3-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=keyutils-1.6.3-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/keyutils-libs-devel@1.6.3-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=keyutils-1.6.3-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/keyutils-libs-devel@1.6.3-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=keyutils-1.6.3-1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2025-14512, CVE-2023-29499, CVE-2025-14087, CVE-2025-4373), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libmount@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libuuid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/hunspell-en-GB@0.20140811.1-20.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=hunspell-en-0.20140811.1-20.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/hunspell-en-GB@0.20140811.1-20.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=hunspell-en-0.20140811.1-20.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/hunspell-en-GB@0.20140811.1-20.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=hunspell-en-0.20140811.1-20.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/hunspell-en-GB@0.20140811.1-20.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=hunspell-en-0.20140811.1-20.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/hunspell-en-GB@0.20140811.1-20.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=hunspell-en-0.20140811.1-20.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/hunspell-en-GB@0.20140811.1-20.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=hunspell-en-0.20140811.1-20.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/hunspell-en-GB@0.20140811.1-20.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=hunspell-en-0.20140811.1-20.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/hunspell-en-GB@0.20140811.1-20.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=hunspell-en-0.20140811.1-20.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/hunspell-en@0.20140811.1-20.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=hunspell-en-0.20140811.1-20.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/hunspell-en@0.20140811.1-20.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=hunspell-en-0.20140811.1-20.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/hunspell-en@0.20140811.1-20.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=hunspell-en-0.20140811.1-20.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/hunspell-en@0.20140811.1-20.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=hunspell-en-0.20140811.1-20.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/hunspell-en@0.20140811.1-20.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=hunspell-en-0.20140811.1-20.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/hunspell-en@0.20140811.1-20.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=hunspell-en-0.20140811.1-20.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/hunspell-en@0.20140811.1-20.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=hunspell-en-0.20140811.1-20.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/hunspell-en@0.20140811.1-20.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=hunspell-en-0.20140811.1-20.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/perl-POSIX@1.94-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Symbol@1.08-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-mro@1.23-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-SelectSaver@1.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Getopt-Std@1.12-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Class-Struct@0.66-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-subs@1.03-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-vars@1.05-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-interpreter@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overload@1.31-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-libs@5.32.1-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=4\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-if@0.60.800-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-stat@1.09-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Fcntl@1.13-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IO@1.43-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-Basename@2.85-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IPC-Open3@1.21-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Errno@1.30-480.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overloading@0.02-480.el9?arch=noarch\u0026distro=rhel-9.2\u0026epoch=0\u0026upstream=perl-5.32.1-480.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Storable@3.21-460.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=perl-Storable-3.21-460.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2017-20230), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/nss_wrapper@1.1.13-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nss_wrapper-1.1.13-1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/llvm-libs@15.0.7-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=llvm-15.0.7-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/llvm-libs@15.0.7-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=llvm-15.0.7-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/llvm-libs@15.0.7-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=llvm-15.0.7-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/llvm-libs@15.0.7-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=llvm-15.0.7-1.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/llvm-libs@15.0.7-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=llvm-15.0.7-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/llvm-libs@15.0.7-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=llvm-15.0.7-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/llvm-libs@15.0.7-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=llvm-15.0.7-1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/llvm-libs@15.0.7-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=llvm-15.0.7-1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/tar@1.34-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=tar-1.34-6.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/tar@1.34-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=tar-1.34-6.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/tar@1.34-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=tar-1.34-6.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/tar@1.34-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=tar-1.34-6.el9_1.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/tar@1.34-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=tar-1.34-6.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/tar@1.34-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=tar-1.34-6.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/tar@1.34-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=tar-1.34-6.el9_1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/annobin@11.05-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=annobin-11.05-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/annobin@11.05-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=annobin-11.05-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/annobin@11.05-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=annobin-11.05-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/annobin@11.05-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=annobin-11.05-1.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/annobin@11.05-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=annobin-11.05-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/annobin@11.05-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=annobin-11.05-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/annobin@11.05-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=annobin-11.05-1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/annobin@11.05-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=annobin-11.05-1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-gconv-extra@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-gconv-extra@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-gconv-extra@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-gconv-extra@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-gconv-extra@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-gconv-extra@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-gconv-extra@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/vim-minimal@8.2.2637-20.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=vim-8.2.2637-20.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/vim-minimal@8.2.2637-20.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=vim-8.2.2637-20.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/vim-minimal@8.2.2637-20.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=vim-8.2.2637-20.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/vim-minimal@8.2.2637-20.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=vim-8.2.2637-20.el9_1.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/vim-minimal@8.2.2637-20.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=vim-8.2.2637-20.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/vim-minimal@8.2.2637-20.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=vim-8.2.2637-20.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/vim-minimal@8.2.2637-20.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=vim-8.2.2637-20.el9_1.src.rpm] (CVE-2020-11023)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;rhtpa_medium_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 372&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found 72 low vulnerabilities.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Source: osv-github. Affected dependencies: pkg:npm/brace-expansion@1.1.11 [direct] (CVE-2025-5889), pkg:npm/brace-expansion@2.0.1 [direct] (CVE-2025-5889), pkg:npm/%40tootallnate/once@2.0.0 [direct] (CVE-2026-3449); Source: redhat-csaf. Affected dependencies: pkg:rpm/redhat/procps-ng@3.3.17-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=procps-ng-3.3.17-11.el9.src.rpm [direct] (CVE-2023-4016), pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm [direct] (CVE-2024-36387), pkg:rpm/redhat/npm@8.19.3-1.16.19.1.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm [direct] (CVE-2023-45143, CVE-2024-36137, CVE-2026-21716, CVE-2023-31124, CVE-2025-23165, CVE-2026-21715, CVE-2024-22018), pkg:rpm/redhat/nodejs-full-i18n@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm [direct] (CVE-2023-45143, CVE-2024-36137, CVE-2026-21716, CVE-2023-31124, CVE-2025-23165, CVE-2026-21715, CVE-2024-22018, CVE-2025-55132), pkg:rpm/redhat/python3-devel@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [direct] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm [direct] (CVE-2026-35386, CVE-2026-35387, CVE-2026-35388), pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm [direct] (CVE-2024-32020, CVE-2024-32021, CVE-2024-50349, CVE-2025-46835), pkg:rpm/redhat/nodejs-docs@16.19.1-1.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm [direct] (CVE-2023-45143, CVE-2024-36137, CVE-2026-21716, CVE-2023-31124, CVE-2025-23165, CVE-2026-21715, CVE-2024-22018), pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpq-13.5-1.el9.src.rpm [direct] (CVE-2022-41862), pkg:rpm/redhat/libcurl-devel@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [direct] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/sqlite@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [direct] (CVE-2025-70873), pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm [direct] (CVE-2024-56433), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/kernel-headers@5.14.0-284.11.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=kernel-5.14.0-284.11.1.el9_2.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2022-50846, CVE-2023-53639, CVE-2023-54153, CVE-2023-54267), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/binutils@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm [transitive via pkg:rpm/redhat/libquadmath-devel@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2025-11412, CVE-2025-11414, CVE-2025-11494, CVE-2025-11495, CVE-2025-11839, CVE-2025-11840, CVE-2025-66861, CVE-2025-66862, CVE-2025-66863, CVE-2025-66864, CVE-2025-66865, CVE-2025-66866, CVE-2025-69647, CVE-2025-69648, CVE-2025-69649, CVE-2025-69650, CVE-2025-69652, CVE-2025-69645, CVE-2025-69646, CVE-2025-69651), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2026-0989, CVE-2026-0992, CVE-2025-6170), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2026-2297, CVE-2026-3479, CVE-2024-5642, CVE-2025-13462), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2024-34397, CVE-2025-7039, CVE-2026-0988), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2026-41990), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2026-41080), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-libdnf@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2026-0989, CVE-2026-0992, CVE-2025-6170), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2026-2297, CVE-2026-3479, CVE-2024-5642, CVE-2025-13462), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-data@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2026-41080), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2026-0989, CVE-2026-0992, CVE-2025-6170), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2026-2297, CVE-2026-3479, CVE-2024-5642, CVE-2025-13462), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2024-34397, CVE-2025-7039, CVE-2026-0988), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2026-41080), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2026-41990), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2024-56433), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/dbus-libs@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/dbus-libs@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/dbus-libs@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2026-41990), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2024-2511, CVE-2026-28387, CVE-2025-9232, CVE-2026-2673), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2024-34397, CVE-2025-7039, CVE-2026-0988), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2026-41990), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/util-linux@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/usermode@1.114-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=usermode-1.114-4.el9.src.rpm] (CVE-2024-56433), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-19.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rsync-3.2.3-19.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-19.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rsync-3.2.3-19.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2024-2511, CVE-2026-28387, CVE-2025-9232, CVE-2026-2673), pkg:rpm/redhat/systemd@252-13.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-13.el9_2.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2026-40228), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2026-41990), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2026-41080), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/util-linux@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-devel@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2024-56433), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-pysocks@1.7.1-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pysocks-1.7.1-12.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pysocks@1.7.1-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pysocks-1.7.1-12.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pysocks@1.7.1-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pysocks-1.7.1-12.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2026-2297, CVE-2026-3479, CVE-2024-5642, CVE-2025-13462), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pysocks@1.7.1-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pysocks-1.7.1-12.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pysocks@1.7.1-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pysocks-1.7.1-12.el9.src.rpm] (CVE-2026-41080), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2026-2297, CVE-2026-3479, CVE-2024-5642, CVE-2025-13462), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2026-41080), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2026-2297, CVE-2026-3479, CVE-2024-5642, CVE-2025-13462), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2024-34397, CVE-2025-7039, CVE-2026-0988), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2026-41080), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2026-0989, CVE-2026-0992, CVE-2025-6170), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@199-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=redhat-rpm-config-199-1.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=procps-ng-3.3.17-11.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=procps-ng-3.3.17-11.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=procps-ng-3.3.17-11.el9.src.rpm] (CVE-2026-41990), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20221215-1.git9a18988.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=crypto-policies-20221215-1.git9a18988.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20221215-1.git9a18988.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=crypto-policies-20221215-1.git9a18988.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20221215-1.git9a18988.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=crypto-policies-20221215-1.git9a18988.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2026-2297, CVE-2026-3479, CVE-2024-5642, CVE-2025-13462), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20221215-1.git9a18988.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=crypto-policies-20221215-1.git9a18988.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20221215-1.git9a18988.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=crypto-policies-20221215-1.git9a18988.el9.src.rpm] (CVE-2026-41080), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm] (CVE-2026-41080), pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/mod_http2@1.15.19-4.el9_2.4?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_http2-1.15.19-4.el9_2.4.src.rpm] (CVE-2024-56433), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2026-41080), pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-56433), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-2511, CVE-2026-28387, CVE-2025-9232, CVE-2026-2673), pkg:rpm/redhat/systemd@252-13.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-13.el9_2.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2026-40228), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2026-41080), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2026-41990), pkg:rpm/redhat/util-linux@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-56433), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/apr-util-openssl@1.6.1-20.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-util-1.6.1-20.el9_2.1.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/apr-util-openssl@1.6.1-20.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-util-1.6.1-20.el9_2.1.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/apr-util-openssl@1.6.1-20.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=apr-util-1.6.1-20.el9_2.1.src.rpm] (CVE-2026-41080), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2026-0989, CVE-2026-0992, CVE-2025-6170), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2026-2297, CVE-2026-3479, CVE-2024-5642, CVE-2025-13462), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2024-34397, CVE-2025-7039, CVE-2026-0988), pkg:rpm/redhat/glib2-devel@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2024-34397), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2026-41080), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/openssl-devel@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2024-2511, CVE-2026-28387, CVE-2025-9232, CVE-2026-2673), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2026-41990), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/util-linux@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/virt-what@1.25-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=virt-what-1.25-3.el9.src.rpm] (CVE-2024-56433), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2026-41080), pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-56433), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/binutils@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm] (CVE-2025-11412, CVE-2025-11414, CVE-2025-11494, CVE-2025-11495, CVE-2025-11839, CVE-2025-11840, CVE-2025-66861, CVE-2025-66862, CVE-2025-66863, CVE-2025-66864, CVE-2025-66865, CVE-2025-66866, CVE-2025-69647, CVE-2025-69648, CVE-2025-69649, CVE-2025-69650, CVE-2025-69652, CVE-2025-69645, CVE-2025-69646, CVE-2025-69651), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2026-2297, CVE-2026-3479, CVE-2024-5642, CVE-2025-13462), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-12.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-setuptools-53.0.0-12.el9.src.rpm] (CVE-2026-41080), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2026-0989, CVE-2026-0992, CVE-2025-6170), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2026-2297, CVE-2026-3479, CVE-2024-5642, CVE-2025-13462), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/cmake-rpm-macros@3.20.2-8.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=cmake-3.20.2-8.el9.src.rpm] (CVE-2026-41080), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/kernel-headers@5.14.0-284.11.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=kernel-5.14.0-284.11.1.el9_2.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2022-50846, CVE-2023-53639, CVE-2023-54153, CVE-2023-54267), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/binutils@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2025-11412, CVE-2025-11414, CVE-2025-11494, CVE-2025-11495, CVE-2025-11839, CVE-2025-11840, CVE-2025-66861, CVE-2025-66862, CVE-2025-66863, CVE-2025-66864, CVE-2025-66865, CVE-2025-66866, CVE-2025-69647, CVE-2025-69648, CVE-2025-69649, CVE-2025-69650, CVE-2025-69652, CVE-2025-69645, CVE-2025-69646, CVE-2025-69651), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2026-0989, CVE-2026-0992, CVE-2025-6170), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2026-2297, CVE-2026-3479, CVE-2024-5642, CVE-2025-13462), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2024-34397, CVE-2025-7039, CVE-2026-0988), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2026-41990), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2026-41080), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm] (CVE-2026-0989, CVE-2026-0992, CVE-2025-6170), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm] (CVE-2026-41080), pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/mod_auth_gssapi@1.6.3-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=mod_auth_gssapi-1.6.3-7.el9.src.rpm] (CVE-2024-56433), pkg:rpm/redhat/nodejs@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.3-1.16.19.1.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2023-45143, CVE-2024-36137, CVE-2026-21716, CVE-2023-31124, CVE-2025-23165, CVE-2026-21715, CVE-2024-22018, CVE-2025-55132), pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.3-1.16.19.1.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2024-2511, CVE-2026-28387, CVE-2025-9232, CVE-2026-2673), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.3-1.16.19.1.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/nodejs-libs@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.3-1.16.19.1.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2026-21716, CVE-2023-31124, CVE-2025-23165, CVE-2026-21715, CVE-2025-55132), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.3-1.16.19.1.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/nodejs@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2023-45143, CVE-2024-36137, CVE-2026-21716, CVE-2023-31124, CVE-2025-23165, CVE-2026-21715, CVE-2024-22018, CVE-2025-55132), pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2024-2511, CVE-2026-28387, CVE-2025-9232, CVE-2026-2673), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/nodejs-libs@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2026-21716, CVE-2023-31124, CVE-2025-23165, CVE-2026-21715, CVE-2025-55132), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.19.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=nodejs-16.19.1-1.el9_2.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-decorator@4.4.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-decorator-4.4.2-6.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-decorator@4.4.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-decorator-4.4.2-6.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-decorator@4.4.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-decorator-4.4.2-6.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2026-2297, CVE-2026-3479, CVE-2024-5642, CVE-2025-13462), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-decorator@4.4.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-decorator-4.4.2-6.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-decorator@4.4.2-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-decorator-4.4.2-6.el9.src.rpm] (CVE-2026-41080), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=environment-modules-5.0.1-2.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=environment-modules-5.0.1-2.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=environment-modules-5.0.1-2.el9.src.rpm] (CVE-2026-41990), pkg:rpm/redhat/procps-ng@3.3.17-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=procps-ng-3.3.17-11.el9.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=environment-modules-5.0.1-2.el9.src.rpm] (CVE-2023-4016), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-34397, CVE-2025-7039, CVE-2026-0988), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2026-41080), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2026-0989, CVE-2026-0992, CVE-2025-6170), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2026-2297, CVE-2026-3479, CVE-2024-5642, CVE-2025-13462), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2024-34397, CVE-2025-7039, CVE-2026-0988), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2026-41080), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2026-41990), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2024-56433), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-devel@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-devel@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-devel@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2026-2297, CVE-2026-3479, CVE-2024-5642, CVE-2025-13462), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-devel@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-devel@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm] (CVE-2026-41080), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-systemd@234-18.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-systemd-234-18.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-systemd@234-18.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-systemd-234-18.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-systemd@234-18.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-systemd-234-18.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2026-2297, CVE-2026-3479, CVE-2024-5642, CVE-2025-13462), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-systemd@234-18.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-systemd-234-18.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-systemd@234-18.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-systemd-234-18.el9.src.rpm] (CVE-2026-41990), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-systemd@234-18.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-systemd-234-18.el9.src.rpm] (CVE-2026-41080), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2026-41080), pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-56433), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2024-2511, CVE-2026-28387, CVE-2025-9232, CVE-2026-2673), pkg:rpm/redhat/openssh@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2026-35386, CVE-2026-35387, CVE-2026-35388), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2026-41990), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/util-linux@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm] (CVE-2024-56433), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2026-2297, CVE-2026-3479, CVE-2024-5642, CVE-2025-13462), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2026-41080), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2026-0989, CVE-2026-0992, CVE-2025-6170), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2026-2297, CVE-2026-3479, CVE-2024-5642, CVE-2025-13462), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2024-34397, CVE-2025-7039, CVE-2026-0988), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2026-41080), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2026-41990), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.69.0-3.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libdnf-0.69.0-3.el9_2.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-2511, CVE-2026-28387, CVE-2025-9232, CVE-2026-2673), pkg:rpm/redhat/systemd@252-13.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-13.el9_2.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2026-40228), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2026-41990), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2026-41080), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/util-linux@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/httpd@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-56433), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2026-0989, CVE-2026-0992, CVE-2025-6170), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2026-41990), pkg:rpm/redhat/procps-ng@3.3.17-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=procps-ng-3.3.17-11.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=scl-utils-2.0.3-4.el9.src.rpm] (CVE-2023-4016), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2026-0989, CVE-2026-0992, CVE-2025-6170), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2026-2297, CVE-2026-3479, CVE-2024-5642, CVE-2025-13462), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2024-34397, CVE-2025-7039, CVE-2026-0988), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2026-41080), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2026-41990), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-dnf@4.14.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-4.14.0-5.el9_2.src.rpm] (CVE-2024-56433), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2026-0989, CVE-2026-0992, CVE-2025-6170), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2026-2297, CVE-2026-3479, CVE-2024-5642, CVE-2025-13462), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2026-41080), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2026-41990), pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-56433), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/kernel-headers@5.14.0-284.11.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=kernel-5.14.0-284.11.1.el9_2.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2022-50846, CVE-2023-53639, CVE-2023-54153, CVE-2023-54267), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/binutils@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2025-11412, CVE-2025-11414, CVE-2025-11494, CVE-2025-11495, CVE-2025-11839, CVE-2025-11840, CVE-2025-66861, CVE-2025-66862, CVE-2025-66863, CVE-2025-66864, CVE-2025-66865, CVE-2025-66866, CVE-2025-69647, CVE-2025-69648, CVE-2025-69649, CVE-2025-69650, CVE-2025-69652, CVE-2025-69645, CVE-2025-69646, CVE-2025-69651), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2026-0989, CVE-2026-0992, CVE-2025-6170), pkg:rpm/redhat/libtiff-devel@4.4.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtiff-4.4.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-6228), pkg:rpm/redhat/libtiff@4.4.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtiff-4.4.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-6228), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2026-2297, CVE-2026-3479, CVE-2024-5642, CVE-2025-13462), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-34397, CVE-2025-7039, CVE-2026-0988), pkg:rpm/redhat/glib2-devel@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-34397), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2026-41080), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/openssh-clients@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2026-35386, CVE-2026-35387, CVE-2026-35388), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2024-2511, CVE-2026-28387, CVE-2025-9232, CVE-2026-2673), pkg:rpm/redhat/openssh@8.7p1-29.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openssh-8.7p1-29.el9_2.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2026-35386, CVE-2026-35387, CVE-2026-35388), pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2024-32020, CVE-2024-32021, CVE-2024-50349, CVE-2025-46835), pkg:rpm/redhat/git-core@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2024-32020, CVE-2024-32021, CVE-2024-50349, CVE-2025-46835), pkg:rpm/redhat/perl-Git@2.39.3-1.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2024-32020, CVE-2024-32021, CVE-2024-50349, CVE-2025-46835), pkg:rpm/redhat/git-core-doc@2.39.3-1.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2024-32020, CVE-2024-32021, CVE-2024-50349, CVE-2025-46835), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2026-41080), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2026-41990), pkg:rpm/redhat/util-linux@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.39.3-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=git-2.39.3-1.el9_2.src.rpm] (CVE-2024-56433), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-pip@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pip@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pip@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2026-2297, CVE-2026-3479, CVE-2024-5642, CVE-2025-13462), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pip@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-pip@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-pip-21.2.3-6.el9.src.rpm] (CVE-2026-41080), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/kernel-headers@5.14.0-284.11.1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=kernel-5.14.0-284.11.1.el9_2.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2022-50846, CVE-2023-53639, CVE-2023-54153, CVE-2023-54267), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/binutils@2.35.2-37.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=binutils-2.35.2-37.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-gfortran@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm] (CVE-2025-11412, CVE-2025-11414, CVE-2025-11494, CVE-2025-11495, CVE-2025-11839, CVE-2025-11840, CVE-2025-66861, CVE-2025-66862, CVE-2025-66863, CVE-2025-66864, CVE-2025-66865, CVE-2025-66866, CVE-2025-69647, CVE-2025-69648, CVE-2025-69649, CVE-2025-69650, CVE-2025-69652, CVE-2025-69645, CVE-2025-69646, CVE-2025-69651), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-34397, CVE-2025-7039, CVE-2026-0988), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2026-41080), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2024-2511, CVE-2026-28387, CVE-2025-9232, CVE-2026-2673), pkg:rpm/redhat/systemd@252-13.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-13.el9_2.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2026-40228), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2026-41990), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2026-41080), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/util-linux@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-devel@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2024-56433), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.15-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-ethtool-0.15-2.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.15-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-ethtool-0.15-2.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.15-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-ethtool-0.15-2.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2026-2297, CVE-2026-3479, CVE-2024-5642, CVE-2025-13462), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.15-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-ethtool-0.15-2.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.15-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python-ethtool-0.15-2.el9.src.rpm] (CVE-2026-41080), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/libkadm5@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/libkadm5@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2026-0989, CVE-2026-0992, CVE-2025-6170), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2026-2297, CVE-2026-3479, CVE-2024-5642, CVE-2025-13462), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2024-34397, CVE-2025-7039, CVE-2026-0988), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2026-41080), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2026-41990), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.3.0-5.el9_2?arch=noarch\u0026distro=rhel-9.2\u0026upstream=dnf-plugins-core-4.3.0-5.el9_2.src.rpm] (CVE-2024-56433), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2026-2297, CVE-2026-3479, CVE-2024-5642, CVE-2025-13462), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2026-41080), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2026-41080), pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.5?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=httpd-2.4.53-11.el9_2.5.src.rpm] (CVE-2024-56433), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libpq@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpq-13.5-1.el9.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2022-41862), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/sscg@3.0.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sscg-3.0.0-7.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/sscg@3.0.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sscg-3.0.0-7.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/krb5-devel@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/krb5-devel@1.20.1-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-8.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/python3-inotify@0.9.6-25.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-inotify-0.9.6-25.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-inotify@0.9.6-25.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-inotify-0.9.6-25.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-inotify@0.9.6-25.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-inotify-0.9.6-25.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2026-2297, CVE-2026-3479, CVE-2024-5642, CVE-2025-13462), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-inotify@0.9.6-25.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-inotify-0.9.6-25.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-inotify@0.9.6-25.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=python-inotify-0.9.6-25.el9.src.rpm] (CVE-2026-41080), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2026-0989, CVE-2026-0992, CVE-2025-6170), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2026-2297, CVE-2026-3479, CVE-2024-5642, CVE-2025-13462), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-34397, CVE-2025-7039, CVE-2026-0988), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2026-41080), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2026-41990), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-56433), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/openssl@3.0.7-6.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-6.el9_2.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-2511, CVE-2026-28387, CVE-2025-9232, CVE-2026-2673), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2026-0989, CVE-2026-0992, CVE-2025-6170), pkg:rpm/redhat/python3@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2026-2297, CVE-2026-3479, CVE-2024-5642, CVE-2025-13462), pkg:rpm/redhat/python3-libs@3.9.16-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=python3.9-3.9.16-1.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/systemd@252-13.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-13.el9_2.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2026-40228), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-34397, CVE-2025-7039, CVE-2026-0988), pkg:rpm/redhat/expat@2.5.0-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=expat-2.5.0-1.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2026-41080), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2026-41990), pkg:rpm/redhat/util-linux@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/shadow-utils@4.9-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=2\u0026upstream=shadow-utils-4.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.33.1-1.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=subscription-manager-1.29.33.1-1.el9_2.src.rpm] (CVE-2024-56433), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2026-0989, CVE-2026-0992, CVE-2025-6170), pkg:rpm/redhat/libtiff@4.4.0-7.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtiff-4.4.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-6228), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-34397, CVE-2025-7039, CVE-2026-0988), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2026-0989, CVE-2026-0992, CVE-2025-6170), pkg:rpm/redhat/libxslt@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxslt-1.1.34-9.el9.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2025-11731), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/xml-common@0.6.3-58.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=sgml-common-0.6.3-58.el9.src.rpm] (CVE-2026-0989, CVE-2026-0992, CVE-2025-6170), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm] (CVE-2026-0989, CVE-2026-0992, CVE-2025-6170), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/enchant@1.6.0-30.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=enchant-1.6.0-30.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/enchant@1.6.0-30.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=enchant-1.6.0-30.el9.src.rpm] (CVE-2024-34397, CVE-2025-7039, CVE-2026-0988), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/enchant@1.6.0-30.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=enchant-1.6.0-30.el9.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/sqlite@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/sqlite-devel@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2025-70873), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2024-34397, CVE-2025-7039, CVE-2026-0988), pkg:rpm/redhat/libblkid@2.37.4-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-10.el9.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2026-3184)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;rhtpa_low_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 72&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;]&#xA;&#x9;}&#xA;]&#xA;{&#34;vulnerabilities&#34;:{&#34;critical&#34;:14,&#34;high&#34;:266,&#34;medium&#34;:372,&#34;low&#34;:72,&#34;unknown&#34;:0},&#34;unpatched_vulnerabilities&#34;:{&#34;critical&#34;:0,&#34;high&#34;:0,&#34;medium&#34;:0,&#34;low&#34;:0,&#34;unknown&#34;:0}}&#xA;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-8db91b08c42f4543dde16ba8ac772c5a35f83632&#34;, &#34;digests&#34;: [&#34;sha256:b4bae6cd649fa727918fa00bbf740a7fdd429feb319a7b56f28fed4c5c2b1901&#34;]}}&#xA;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-02T06:00:37+00:00&#34;,&#34;note&#34;:&#34;Task tpa-scan completed: Refer to Tekton task result SCAN_OUTPUT for vulnerabilities scanned by TPA.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;New PipelineRun python-component-sukmsc-on-pull-request-2vxmt found after retrigger for component build-e2e-wqrk/python-component-sukmsc&#xA;PipelineRun python-component-sukmsc-on-pull-request-2vxmt found for Component build-e2e-wqrk/python-component-sukmsc&#xA;PipelineRun python-component-sukmsc-on-pull-request-2vxmt reason: ResolvingTaskRef&#xA;PipelineRun python-component-sukmsc-on-pull-request-2vxmt reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-2vxmt reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-2vxmt reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-2vxmt reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-2vxmt reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-2vxmt reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-2vxmt reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-2vxmt reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-2vxmt reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-2vxmt reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-2vxmt reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-2vxmt reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-2vxmt reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-2vxmt reason: Running&#xA;PipelineRun python-component-sukmsc-on-pull-request-2vxmt reason: Failed&#xA;attempt 3/3: PipelineRun &#34;python-component-sukmsc-on-pull-request-2vxmt&#34; failed: &#xA; pod: python-component-sukmsc-on-591f02614276501c9909e28298413f3d-pod | init container: prepare&#xA;2026/05/02 06:01:15 Entrypoint initialization&#xA;&#xA; pod: python-component-sukmsc-on-591f02614276501c9909e28298413f3d-pod | init container: place-scripts&#xA;2026/05/02 06:01:15 Decoded script /tekton/scripts/script-0-42c8p&#xA;2026/05/02 06:01:15 Decoded script /tekton/scripts/script-1-clsx6&#xA;&#xA;pod: python-component-sukmsc-on-591f02614276501c9909e28298413f3d-pod | container step-clone: &#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1777701678.9782343,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1777701679.423236,&#34;caller&#34;:&#34;git/git.go:223&#34;,&#34;msg&#34;:&#34;Successfully cloned https://github.com/redhat-appstudio-qe/sample-multi-component @ 9a58fff0b20b171aa9240228699291a7c9c1b6fd (grafted, HEAD) in path /var/workdir/source&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1777701679.4232862,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1777701679.4468265,&#34;caller&#34;:&#34;git/git.go:277&#34;,&#34;msg&#34;:&#34;Successfully initialized and updated submodules in path /var/workdir/source&#34;}&#xA;Merge option disabled. Using checked-out revision 9a58fff0b20b171aa9240228699291a7c9c1b6fd directly.&#xA;&#xA;pod: python-component-sukmsc-on-591f02614276501c9909e28298413f3d-pod | container step-symlink-check: &#xA;Running symlink check&#xA;&#xA;pod: python-component-sukmsc-on-591f02614276501c9909e28298413f3d-pod | container step-create-trusted-artifact: &#xA;Prepared artifact from /var/workdir/source (sha256:30a0bd277a19ad7be874275280017ea11cf53bbb756ca66fd1cdcd2fa0c312c1)&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc&#xA;Executing: oras push --annotation=quay.expires-after=5d --registry-config /tmp/create-oci.sh.J0N6ty/auth-CgZpio.json quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-9a58fff0b20b171aa9240228699291a7c9c1b6fd.git SOURCE_ARTIFACT&#xA;Uploading 30a0bd277a19 SOURCE_ARTIFACT&#xA;Uploaded  30a0bd277a19 SOURCE_ARTIFACT&#xA;Pushed [registry] quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-9a58fff0b20b171aa9240228699291a7c9c1b6fd.git&#xA;ArtifactType: application/vnd.unknown.artifact.v1&#xA;Digest: sha256:29b0286379e2717b11864360450387a73e9986f6be7c3627aab5854f910f9a93&#xA;Artifacts created&#xA;&#xA;&#xA; pod: python-component-sukmsc-on-7390bf2e487a3b4c4aee6988d7d2b712-pod | init container: prepare&#xA;2026/05/02 06:02:02 Entrypoint initialization&#xA;&#xA; pod: python-component-sukmsc-on-7390bf2e487a3b4c4aee6988d7d2b712-pod | init container: place-scripts&#xA;2026/05/02 06:02:03 Decoded script /tekton/scripts/script-1-wknqh&#xA;2026/05/02 06:02:03 Decoded script /tekton/scripts/script-2-rhf2s&#xA;2026/05/02 06:02:03 Decoded script /tekton/scripts/script-3-xkm58&#xA;2026/05/02 06:02:03 Decoded script /tekton/scripts/script-4-hkg9r&#xA;2026/05/02 06:02:03 Decoded script /tekton/scripts/script-5-n82hr&#xA;&#xA;pod: python-component-sukmsc-on-7390bf2e487a3b4c4aee6988d7d2b712-pod | container step-use-trusted-artifact: &#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc&#xA;Executing: oras blob fetch --registry-config /tmp/use-oci.sh.OztHxz/auth-Sp4x4T.json quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc@sha256:30a0bd277a19ad7be874275280017ea11cf53bbb756ca66fd1cdcd2fa0c312c1 --output -&#xA;Restored artifact quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc@sha256:30a0bd277a19ad7be874275280017ea11cf53bbb756ca66fd1cdcd2fa0c312c1 to /var/workdir/source&#xA;WARN: artifact URI not provided, (given: =/var/workdir/cachi2)&#xA;&#xA;&#xA;pod: python-component-sukmsc-on-7390bf2e487a3b4c4aee6988d7d2b712-pod | container step-build: &#xA;[2026-05-02T06:02:08,343082023+00:00] Validate context path&#xA;[2026-05-02T06:02:08,346510359+00:00] Update CA trust&#xA;[2026-05-02T06:02:08,347544486+00:00] Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;[2026-05-02T06:02:12,240664532+00:00] Prepare Dockerfile&#xA;Checking if /var/workdir/cachi2/output/bom.json exists.&#xA;Could not find prefetched sbom. No content_sets found for ICM&#xA;[2026-05-02T06:02:12,248230526+00:00] Prepare system (architecture: x86_64)&#xA;[2026-05-02T06:02:12,264402475+00:00] Setup prefetched&#xA;Trying to pull registry.access.redhat.com/ubi9/python-39:1-117.1684741281...&#xA;Getting image source signatures&#xA;Checking if image destination supports signatures&#xA;Copying blob sha256:8a2e9815396eaa57b0dfe27b2dfc442417f06aa70974c358f198980b533c7942&#xA;Copying blob sha256:5465449a2ea5d8a7e05fa498c8ba35f0ce7714b0ad37e716961fca17dfa1ef13&#xA;Copying blob sha256:085efe85e9dfb0b3d5d2392e4b78660a3091bf1ded336315117a627fbdd0567d&#xA;Copying blob sha256:a07d808ddf4404b3885fef6100142a973cc667b2c3c4abcf4db96508795b1efb&#xA;Copying config sha256:45c8f23c11bb64f238236aaf5cbe05595778e1d4fb6c06109c6fcc0a6b57a45b&#xA;Writing manifest to image destination&#xA;Storing signatures&#xA;[2026-05-02T06:02:42,835630513+00:00] Unsetting proxy&#xA;{&#xA;  &#34;architecture&#34;: &#34;x86_64&#34;,&#xA;  &#34;build-date&#34;: &#34;2026-05-02T06:02:12Z&#34;,&#xA;  &#34;com.redhat.component&#34;: &#34;python-39-container&#34;,&#xA;  &#34;com.redhat.license_terms&#34;: &#34;https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI&#34;,&#xA;  &#34;description&#34;: &#34;Python 3.9 available as container is a base platform for building and running various Python 3.9 applications and frameworks. Python is an easy to learn, powerful programming language. It has efficient high-level data structures and a simple but effective approach to object-oriented programming. Python&#39;s elegant syntax and dynamic typing, together with its interpreted nature, make it an ideal language for scripting and rapid application development in many areas on most platforms.&#34;,&#xA;  &#34;distribution-scope&#34;: &#34;public&#34;,&#xA;  &#34;io.buildah.version&#34;: &#34;1.42.2&#34;,&#xA;  &#34;io.buildpacks.stack.id&#34;: &#34;com.redhat.stacks.ubi9-python-39&#34;,&#xA;  &#34;io.k8s.description&#34;: &#34;Python 3.9 available as container is a base platform for building and running various Python 3.9 applications and frameworks. Python is an easy to learn, powerful programming language. It has efficient high-level data structures and a simple but effective approach to object-oriented programming. Python&#39;s elegant syntax and dynamic typing, together with its interpreted nature, make it an ideal language for scripting and rapid application development in many areas on most platforms.&#34;,&#xA;  &#34;io.k8s.display-name&#34;: &#34;Python 3.9&#34;,&#xA;  &#34;io.openshift.expose-services&#34;: &#34;8080:http&#34;,&#xA;  &#34;io.openshift.s2i.scripts-url&#34;: &#34;image:///usr/libexec/s2i&#34;,&#xA;  &#34;io.openshift.tags&#34;: &#34;builder,python,python39,python-39,rh-python39&#34;,&#xA;  &#34;io.s2i.scripts-url&#34;: &#34;image:///usr/libexec/s2i&#34;,&#xA;  &#34;maintainer&#34;: &#34;SoftwareCollections.org &lt;sclorg@redhat.com&gt;&#34;,&#xA;  &#34;name&#34;: &#34;ubi9/python-39&#34;,&#xA;  &#34;release&#34;: &#34;117.1684741281&#34;,&#xA;  &#34;summary&#34;: &#34;Platform for building and running Python 3.9 applications&#34;,&#xA;  &#34;url&#34;: &#34;https://access.redhat.com/containers/#/registry.access.redhat.com/ubi9/python-39/images/1-117.1684741281&#34;,&#xA;  &#34;usage&#34;: &#34;s2i build https://github.com/sclorg/s2i-python-container.git --context-dir=3.9/test/setup-test-app/ ubi9/python-39 python-sample-app&#34;,&#xA;  &#34;vcs-ref&#34;: &#34;9a58fff0b20b171aa9240228699291a7c9c1b6fd&#34;,&#xA;  &#34;vcs-type&#34;: &#34;git&#34;,&#xA;  &#34;vendor&#34;: &#34;Red Hat, Inc.&#34;,&#xA;  &#34;version&#34;: &#34;1&#34;,&#xA;  &#34;org.opencontainers.image.revision&#34;: &#34;9a58fff0b20b171aa9240228699291a7c9c1b6fd&#34;,&#xA;  &#34;org.opencontainers.image.source&#34;: &#34;https://github.com/redhat-appstudio-qe/sample-multi-component&#34;,&#xA;  &#34;quay.expires-after&#34;: &#34;5d&#34;,&#xA;  &#34;org.opencontainers.image.created&#34;: &#34;2026-05-02T06:02:12Z&#34;&#xA;}&#xA;[2026-05-02T06:02:42,939251206+00:00] Register sub-man&#xA;Adding the entitlement to the build&#xA;[2026-05-02T06:02:42,942342755+00:00] Add secrets&#xA;[2026-05-02T06:02:42,958124691+00:00] Run buildah build&#xA;[2026-05-02T06:02:42,959167684+00:00] buildah build --volume /tmp/entitlement:/etc/pki/entitlement --security-opt=unmask=/proc/interrupts --label architecture=x86_64 --label vcs-type=git --label vcs-ref=9a58fff0b20b171aa9240228699291a7c9c1b6fd --label org.opencontainers.image.revision=9a58fff0b20b171aa9240228699291a7c9c1b6fd --label org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/sample-multi-component --label quay.expires-after=5d --label build-date=2026-05-02T06:02:12Z --label org.opencontainers.image.created=2026-05-02T06:02:12Z --annotation org.opencontainers.image.revision=9a58fff0b20b171aa9240228699291a7c9c1b6fd --annotation org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/sample-multi-component --annotation org.opencontainers.image.created=2026-05-02T06:02:12Z --tls-verify=true --no-cache --ulimit nofile=4096:4096 --http-proxy=false -f /tmp/Dockerfile.xk9LA0 -t quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-9a58fff0b20b171aa9240228699291a7c9c1b6fd . &#xA;STEP 1/10: FROM registry.access.redhat.com/ubi9/python-39:1-117.1684741281&#xA;STEP 2/10: EXPOSE 8081/tcp&#xA;STEP 3/10: ENV FLASK_PORT=8081&#xA;STEP 4/10: WORKDIR /projects&#xA;STEP 5/10: COPY . .&#xA;STEP 6/10: RUN   if [ -f requirements.txt ];     then pip install -r requirements.txt;   elif [ `ls -1q *.txt | wc -l` == 1 ];     then pip install -r *.txt;   fi&#xA;Collecting Flask==2.3.3&#xA;  Downloading flask-2.3.3-py3-none-any.whl (96 kB)&#xA;Collecting blinker&gt;=1.6.2&#xA;  Downloading blinker-1.9.0-py3-none-any.whl (8.5 kB)&#xA;Collecting importlib-metadata&gt;=3.6.0&#xA;  Downloading importlib_metadata-8.7.1-py3-none-any.whl (27 kB)&#xA;Collecting Jinja2&gt;=3.1.2&#xA;  Downloading jinja2-3.1.6-py3-none-any.whl (134 kB)&#xA;Collecting itsdangerous&gt;=2.1.2&#xA;  Downloading itsdangerous-2.2.0-py3-none-any.whl (16 kB)&#xA;Collecting click&gt;=8.1.3&#xA;  Downloading click-8.1.8-py3-none-any.whl (98 kB)&#xA;Collecting Werkzeug&gt;=2.3.7&#xA;  Downloading werkzeug-3.1.8-py3-none-any.whl (226 kB)&#xA;Collecting zipp&gt;=3.20&#xA;  Downloading zipp-3.23.1-py3-none-any.whl (10 kB)&#xA;Collecting MarkupSafe&gt;=2.0&#xA;  Downloading markupsafe-3.0.3-cp39-cp39-manylinux2014_x86_64.manylinux_2_17_x86_64.manylinux_2_28_x86_64.whl (20 kB)&#xA;Installing collected packages: zipp, MarkupSafe, Werkzeug, Jinja2, itsdangerous, importlib-metadata, click, blinker, Flask&#xA;Successfully installed Flask-2.3.3 Jinja2-3.1.6 MarkupSafe-3.0.3 Werkzeug-3.1.8 blinker-1.9.0 click-8.1.8 importlib-metadata-8.7.1 itsdangerous-2.2.0 zipp-3.23.1&#xA;WARNING: You are using pip version 21.3.1; however, version 26.0.1 is available.&#xA;You should consider upgrading via the &#39;/opt/app-root/bin/python3.9 -m pip install --upgrade pip&#39; command.&#xA;STEP 7/10: CMD [ &#34;python&#34;, &#34;./app.py&#34; ]&#xA;STEP 8/10: COPY labels.json /usr/share/buildinfo/labels.json&#xA;STEP 9/10: COPY labels.json /root/buildinfo/labels.json&#xA;STEP 10/10: LABEL &#34;architecture&#34;=&#34;x86_64&#34; &#34;vcs-type&#34;=&#34;git&#34; &#34;vcs-ref&#34;=&#34;9a58fff0b20b171aa9240228699291a7c9c1b6fd&#34; &#34;org.opencontainers.image.revision&#34;=&#34;9a58fff0b20b171aa9240228699291a7c9c1b6fd&#34; &#34;org.opencontainers.image.source&#34;=&#34;https://github.com/redhat-appstudio-qe/sample-multi-component&#34; &#34;quay.expires-after&#34;=&#34;5d&#34; &#34;build-date&#34;=&#34;2026-05-02T06:02:12Z&#34; &#34;org.opencontainers.image.created&#34;=&#34;2026-05-02T06:02:12Z&#34;&#xA;COMMIT quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-9a58fff0b20b171aa9240228699291a7c9c1b6fd&#xA;--&gt; ca84e75f124f&#xA;Successfully tagged quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-9a58fff0b20b171aa9240228699291a7c9c1b6fd&#xA;ca84e75f124f87650d18f671c13714546ff668228556de54b4b53120968860cb&#xA;[2026-05-02T06:02:48,359474036+00:00] Unsetting proxy&#xA;[2026-05-02T06:02:48,360843489+00:00] Add metadata&#xA;Recording base image digests used&#xA;registry.access.redhat.com/ubi9/python-39:1-117.1684741281 registry.access.redhat.com/ubi9/python-39:1-117.1684741281@sha256:40a58935b9c22664927b22bf256f53a3d744ddb7316f3af18061099e199526ee&#xA;Getting image source signatures&#xA;Copying blob sha256:a3551a1f52c5788c9e4e19e7458ecd57b93554fb4cad127b13d61c73c13775e4&#xA;Copying blob sha256:d661a108c347030c3ef626a0e0020e084fba1e1023193824f5395fa90ef40bde&#xA;Copying blob sha256:d93d3cc0bc0c5ed9655bcdcf31183ed0b570076c0e6a13e0d7cb907d0b877b00&#xA;Copying blob sha256:629980bfa23ec05ce5acc61ed2866ddf8713f40bb2a61f0850395082f1457220&#xA;Copying blob sha256:bc8a0003b3470be53e5cf295daf38c287d3f20ab90e8f5c2b6f17406b158d323&#xA;Copying config sha256:ca84e75f124f87650d18f671c13714546ff668228556de54b4b53120968860cb&#xA;Writing manifest to image destination&#xA;[2026-05-02T06:03:22,157574695+00:00] End build&#xA;&#xA;pod: python-component-sukmsc-on-7390bf2e487a3b4c4aee6988d7d2b712-pod | container step-push: &#xA;[2026-05-02T06:03:22,816503114+00:00] Update CA trust&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;[2026-05-02T06:03:43,886667723+00:00] Convert image&#xA;[2026-05-02T06:03:43,887746209+00:00] Push image with unique tag&#xA;Pushing to quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:python-component-sukmsc-on-pull-request-2vxmt-build-container&#xA;[retry] executing: buildah push --format=docker --retry 3 --tls-verify=true quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-9a58fff0b20b171aa9240228699291a7c9c1b6fd docker://quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:python-component-sukmsc-on-pull-request-2vxmt-build-container&#xA;Getting image source signatures&#xA;Copying blob sha256:a3551a1f52c5788c9e4e19e7458ecd57b93554fb4cad127b13d61c73c13775e4&#xA;Copying blob sha256:bc8a0003b3470be53e5cf295daf38c287d3f20ab90e8f5c2b6f17406b158d323&#xA;Copying blob sha256:d93d3cc0bc0c5ed9655bcdcf31183ed0b570076c0e6a13e0d7cb907d0b877b00&#xA;Copying blob sha256:629980bfa23ec05ce5acc61ed2866ddf8713f40bb2a61f0850395082f1457220&#xA;Copying blob sha256:d661a108c347030c3ef626a0e0020e084fba1e1023193824f5395fa90ef40bde&#xA;&#xA;pod: python-component-sukmsc-on-7390bf2e487a3b4c4aee6988d7d2b712-pod | container step-sbom-syft-generate: &#xA;&#xA;pod: python-component-sukmsc-on-7390bf2e487a3b4c4aee6988d7d2b712-pod | container step-prepare-sboms: &#xA;&#xA;pod: python-component-sukmsc-on-7390bf2e487a3b4c4aee6988d7d2b712-pod | container step-upload-sbom: &#xA;&#xA; pod: python-component-sukmsc-on-pull-request-2vxmt-init-pod | init container: prepare&#xA;2026/05/02 06:01:09 Entrypoint initialization&#xA;&#xA;pod: python-component-sukmsc-on-pull-request-2vxmt-init-pod | container step-init: &#xA;time=&#34;2026-05-02T06:01:13Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-05-02T06:01:13Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-05-02T06:01:13Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-05-02T06:01:13Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-05-02T06:01:13Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-05-02T06:01:13Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-02T06:01:13Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-05-02T06:01:13Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-05-02T06:01:13Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;[FAILED] Expected success, but got an error:&#xA;    &lt;*errors.errorString | 0xc001502b20&gt;: &#xA;    &#xA;     pod: python-component-sukmsc-on-591f02614276501c9909e28298413f3d-pod | init container: prepare&#xA;    2026/05/02 06:01:15 Entrypoint initialization&#xA;    &#xA;     pod: python-component-sukmsc-on-591f02614276501c9909e28298413f3d-pod | init container: place-scripts&#xA;    2026/05/02 06:01:15 Decoded script /tekton/scripts/script-0-42c8p&#xA;    2026/05/02 06:01:15 Decoded script /tekton/scripts/script-1-clsx6&#xA;    &#xA;    pod: python-component-sukmsc-on-591f02614276501c9909e28298413f3d-pod | container step-clone: &#xA;    INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;    {&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1777701678.9782343,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;    {&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1777701679.423236,&#34;caller&#34;:&#34;git/git.go:223&#34;,&#34;msg&#34;:&#34;Successfully cloned https://github.com/redhat-appstudio-qe/sample-multi-component @ 9a58fff0b20b171aa9240228699291a7c9c1b6fd (grafted, HEAD) in path /var/workdir/source&#34;}&#xA;    {&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1777701679.4232862,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;    {&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1777701679.4468265,&#34;caller&#34;:&#34;git/git.go:277&#34;,&#34;msg&#34;:&#34;Successfully initialized and updated submodules in path /var/workdir/source&#34;}&#xA;    Merge option disabled. Using checked-out revision 9a58fff0b20b171aa9240228699291a7c9c1b6fd directly.&#xA;    &#xA;    pod: python-component-sukmsc-on-591f02614276501c9909e28298413f3d-pod | container step-symlink-check: &#xA;    Running symlink check&#xA;    &#xA;    pod: python-component-sukmsc-on-591f02614276501c9909e28298413f3d-pod | container step-create-trusted-artifact: &#xA;    Prepared artifact from /var/workdir/source (sha256:30a0bd277a19ad7be874275280017ea11cf53bbb756ca66fd1cdcd2fa0c312c1)&#xA;    Using token for quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc&#xA;    Executing: oras push --annotation=quay.expires-after=5d --registry-config /tmp/create-oci.sh.J0N6ty/auth-CgZpio.json quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-9a58fff0b20b171aa9240228699291a7c9c1b6fd.git SOURCE_ARTIFACT&#xA;    Uploading 30a0bd277a19 SOURCE_ARTIFACT&#xA;    Uploaded  30a0bd277a19 SOURCE_ARTIFACT&#xA;    Pushed [registry] quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-9a58fff0b20b171aa9240228699291a7c9c1b6fd.git&#xA;    ArtifactType: application/vnd.unknown.artifact.v1&#xA;    Digest: sha256:29b0286379e2717b11864360450387a73e9986f6be7c3627aab5854f910f9a93&#xA;    Artifacts created&#xA;    &#xA;    &#xA;     pod: python-component-sukmsc-on-7390bf2e487a3b4c4aee6988d7d2b712-pod | init container: prepare&#xA;    2026/05/02 06:02:02 Entrypoint initialization&#xA;    &#xA;     pod: python-component-sukmsc-on-7390bf2e487a3b4c4aee6988d7d2b712-pod | init container: place-scripts&#xA;    2026/05/02 06:02:03 Decoded script /tekton/scripts/script-1-wknqh&#xA;    2026/05/02 06:02:03 Decoded script /tekton/scripts/script-2-rhf2s&#xA;    2026/05/02 06:02:03 Decoded script /tekton/scripts/script-3-xkm58&#xA;    2026/05/02 06:02:03 Decoded script /tekton/scripts/script-4-hkg9r&#xA;    2026/05/02 06:02:03 Decoded script /tekton/scripts/script-5-n82hr&#xA;    &#xA;    pod: python-component-sukmsc-on-7390bf2e487a3b4c4aee6988d7d2b712-pod | container step-use-trusted-artifact: &#xA;    Using token for quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc&#xA;    Executing: oras blob fetch --registry-config /tmp/use-oci.sh.OztHxz/auth-Sp4x4T.json quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc@sha256:30a0bd277a19ad7be874275280017ea11cf53bbb756ca66fd1cdcd2fa0c312c1 --output -&#xA;    Restored artifact quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc@sha256:30a0bd277a19ad7be874275280017ea11cf53bbb756ca66fd1cdcd2fa0c312c1 to /var/workdir/source&#xA;    WARN: artifact URI not provided, (given: =/var/workdir/cachi2)&#xA;    &#xA;    &#xA;    pod: python-component-sukmsc-on-7390bf2e487a3b4c4aee6988d7d2b712-pod | container step-build: &#xA;    [2026-05-02T06:02:08,343082023+00:00] Validate context path&#xA;    [2026-05-02T06:02:08,346510359+00:00] Update CA trust&#xA;    [2026-05-02T06:02:08,347544486+00:00] Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;    &#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;    [2026-05-02T06:02:12,240664532+00:00] Prepare Dockerfile&#xA;    Checking if /var/workdir/cachi2/output/bom.json exists.&#xA;    Could not find prefetched sbom. No content_sets found for ICM&#xA;    [2026-05-02T06:02:12,248230526+00:00] Prepare system (architecture: x86_64)&#xA;    [2026-05-02T06:02:12,264402475+00:00] Setup prefetched&#xA;    Trying to pull registry.access.redhat.com/ubi9/python-39:1-117.1684741281...&#xA;    Getting image source signatures&#xA;    Checking if image destination supports signatures&#xA;    Copying blob sha256:8a2e9815396eaa57b0dfe27b2dfc442417f06aa70974c358f198980b533c7942&#xA;    Copying blob sha256:5465449a2ea5d8a7e05fa498c8ba35f0ce7714b0ad37e716961fca17dfa1ef13&#xA;    Copying blob sha256:085efe85e9dfb0b3d5d2392e4b78660a3091bf1ded336315117a627fbdd0567d&#xA;    Copying blob sha256:a07d808ddf4404b3885fef6100142a973cc667b2c3c4abcf4db96508795b1efb&#xA;    Copying config sha256:45c8f23c11bb64f238236aaf5cbe05595778e1d4fb6c06109c6fcc0a6b57a45b&#xA;    Writing manifest to image destination&#xA;    Storing signatures&#xA;    [2026-05-02T06:02:42,835630513+00:00] Unsetting proxy&#xA;    {&#xA;      &#34;architecture&#34;: &#34;x86_64&#34;,&#xA;      &#34;build-date&#34;: &#34;2026-05-02T06:02:12Z&#34;,&#xA;      &#34;com.redhat.component&#34;: &#34;python-39-container&#34;,&#xA;      &#34;com.redhat.license_terms&#34;: &#34;https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI&#34;,&#xA;      &#34;description&#34;: &#34;Python 3.9 available as container is a base platform for building and running various Python 3.9 applications and frameworks. Python is an easy to learn, powerful programming language. It has efficient high-level data structures and a simple but effective approach to object-oriented programming. Python&#39;s elegant syntax and dynamic typing, together with its interpreted nature, make it an ideal language for scripting and rapid application development in many areas on most platforms.&#34;,&#xA;      &#34;distribution-scope&#34;: &#34;public&#34;,&#xA;      &#34;io.buildah.version&#34;: &#34;1.42.2&#34;,&#xA;      &#34;io.buildpacks.stack.id&#34;: &#34;com.redhat.stacks.ubi9-python-39&#34;,&#xA;      &#34;io.k8s.description&#34;: &#34;Python 3.9 available as container is a base platform for building and running various Python 3.9 applications and frameworks. Python is an easy to learn, powerful programming language. It has efficient high-level data structures and a simple but effective approach to object-oriented programming. Python&#39;s elegant syntax and dynamic typing, together with its interpreted nature, make it an ideal language for scripting and rapid application development in many areas on most platforms.&#34;,&#xA;      &#34;io.k8s.display-name&#34;: &#34;Python 3.9&#34;,&#xA;      &#34;io.openshift.expose-services&#34;: &#34;8080:http&#34;,&#xA;      &#34;io.openshift.s2i.scripts-url&#34;: &#34;image:///usr/libexec/s2i&#34;,&#xA;      &#34;io.openshift.tags&#34;: &#34;builder,python,python39,python-39,rh-python39&#34;,&#xA;      &#34;io.s2i.scripts-url&#34;: &#34;image:///usr/libexec/s2i&#34;,&#xA;      &#34;maintainer&#34;: &#34;SoftwareCollections.org &lt;sclorg@redhat.com&gt;&#34;,&#xA;      &#34;name&#34;: &#34;ubi9/python-39&#34;,&#xA;      &#34;release&#34;: &#34;117.1684741281&#34;,&#xA;      &#34;summary&#34;: &#34;Platform for building and running Python 3.9 applications&#34;,&#xA;      &#34;url&#34;: &#34;https://access.redhat.com/containers/#/registry.access.redhat.com/ubi9/python-39/images/1-117.1684741281&#34;,&#xA;      &#34;usage&#34;: &#34;s2i build https://github.com/sclorg/s2i-python-container.git --context-dir=3.9/test/setup-test-app/ ubi9/python-39 python-sample-app&#34;,&#xA;      &#34;vcs-ref&#34;: &#34;9a58fff0b20b171aa9240228699291a7c9c1b6fd&#34;,&#xA;      &#34;vcs-type&#34;: &#34;git&#34;,&#xA;      &#34;vendor&#34;: &#34;Red Hat, Inc.&#34;,&#xA;      &#34;version&#34;: &#34;1&#34;,&#xA;      &#34;org.opencontainers.image.revision&#34;: &#34;9a58fff0b20b171aa9240228699291a7c9c1b6fd&#34;,&#xA;      &#34;org.opencontainers.image.source&#34;: &#34;https://github.com/redhat-appstudio-qe/sample-multi-component&#34;,&#xA;      &#34;quay.expires-after&#34;: &#34;5d&#34;,&#xA;      &#34;org.opencontainers.image.created&#34;: &#34;2026-05-02T06:02:12Z&#34;&#xA;    }&#xA;    [2026-05-02T06:02:42,939251206+00:00] Register sub-man&#xA;    Adding the entitlement to the build&#xA;    [2026-05-02T06:02:42,942342755+00:00] Add secrets&#xA;    [2026-05-02T06:02:42,958124691+00:00] Run buildah build&#xA;    [2026-05-02T06:02:42,959167684+00:00] buildah build --volume /tmp/entitlement:/etc/pki/entitlement --security-opt=unmask=/proc/interrupts --label architecture=x86_64 --label vcs-type=git --label vcs-ref=9a58fff0b20b171aa9240228699291a7c9c1b6fd --label org.opencontainers.image.revision=9a58fff0b20b171aa9240228699291a7c9c1b6fd --label org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/sample-multi-component --label quay.expires-after=5d --label build-date=2026-05-02T06:02:12Z --label org.opencontainers.image.created=2026-05-02T06:02:12Z --annotation org.opencontainers.image.revision=9a58fff0b20b171aa9240228699291a7c9c1b6fd --annotation org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/sample-multi-component --annotation org.opencontainers.image.created=2026-05-02T06:02:12Z --tls-verify=true --no-cache --ulimit nofile=4096:4096 --http-proxy=false -f /tmp/Dockerfile.xk9LA0 -t quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-9a58fff0b20b171aa9240228699291a7c9c1b6fd . &#xA;    STEP 1/10: FROM registry.access.redhat.com/ubi9/python-39:1-117.1684741281&#xA;    STEP 2/10: EXPOSE 8081/tcp&#xA;    STEP 3/10: ENV FLASK_PORT=8081&#xA;    STEP 4/10: WORKDIR /projects&#xA;    STEP 5/10: COPY . .&#xA;    STEP 6/10: RUN   if [ -f requirements.txt ];     then pip install -r requirements.txt;   elif [ `ls -1q *.txt | wc -l` == 1 ];     then pip install -r *.txt;   fi&#xA;    Collecting Flask==2.3.3&#xA;      Downloading flask-2.3.3-py3-none-any.whl (96 kB)&#xA;    Collecting blinker&gt;=1.6.2&#xA;      Downloading blinker-1.9.0-py3-none-any.whl (8.5 kB)&#xA;    Collecting importlib-metadata&gt;=3.6.0&#xA;      Downloading importlib_metadata-8.7.1-py3-none-any.whl (27 kB)&#xA;    Collecting Jinja2&gt;=3.1.2&#xA;      Downloading jinja2-3.1.6-py3-none-any.whl (134 kB)&#xA;    Collecting itsdangerous&gt;=2.1.2&#xA;      Downloading itsdangerous-2.2.0-py3-none-any.whl (16 kB)&#xA;    Collecting click&gt;=8.1.3&#xA;      Downloading click-8.1.8-py3-none-any.whl (98 kB)&#xA;    Collecting Werkzeug&gt;=2.3.7&#xA;      Downloading werkzeug-3.1.8-py3-none-any.whl (226 kB)&#xA;    Collecting zipp&gt;=3.20&#xA;      Downloading zipp-3.23.1-py3-none-any.whl (10 kB)&#xA;    Collecting MarkupSafe&gt;=2.0&#xA;      Downloading markupsafe-3.0.3-cp39-cp39-manylinux2014_x86_64.manylinux_2_17_x86_64.manylinux_2_28_x86_64.whl (20 kB)&#xA;    Installing collected packages: zipp, MarkupSafe, Werkzeug, Jinja2, itsdangerous, importlib-metadata, click, blinker, Flask&#xA;    Successfully installed Flask-2.3.3 Jinja2-3.1.6 MarkupSafe-3.0.3 Werkzeug-3.1.8 blinker-1.9.0 click-8.1.8 importlib-metadata-8.7.1 itsdangerous-2.2.0 zipp-3.23.1&#xA;    WARNING: You are using pip version 21.3.1; however, version 26.0.1 is available.&#xA;    You should consider upgrading via the &#39;/opt/app-root/bin/python3.9 -m pip install --upgrade pip&#39; command.&#xA;    STEP 7/10: CMD [ &#34;python&#34;, &#34;./app.py&#34; ]&#xA;    STEP 8/10: COPY labels.json /usr/share/buildinfo/labels.json&#xA;    STEP 9/10: COPY labels.json /root/buildinfo/labels.json&#xA;    STEP 10/10: LABEL &#34;architecture&#34;=&#34;x86_64&#34; &#34;vcs-type&#34;=&#34;git&#34; &#34;vcs-ref&#34;=&#34;9a58fff0b20b171aa9240228699291a7c9c1b6fd&#34; &#34;org.opencontainers.image.revision&#34;=&#34;9a58fff0b20b171aa9240228699291a7c9c1b6fd&#34; &#34;org.opencontainers.image.source&#34;=&#34;https://github.com/redhat-appstudio-qe/sample-multi-component&#34; &#34;quay.expires-after&#34;=&#34;5d&#34; &#34;build-date&#34;=&#34;2026-05-02T06:02:12Z&#34; &#34;org.opencontainers.image.created&#34;=&#34;2026-05-02T06:02:12Z&#34;&#xA;    COMMIT quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-9a58fff0b20b171aa9240228699291a7c9c1b6fd&#xA;    --&gt; ca84e75f124f&#xA;    Successfully tagged quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-9a58fff0b20b171aa9240228699291a7c9c1b6fd&#xA;    ca84e75f124f87650d18f671c13714546ff668228556de54b4b53120968860cb&#xA;    [2026-05-02T06:02:48,359474036+00:00] Unsetting proxy&#xA;    [2026-05-02T06:02:48,360843489+00:00] Add metadata&#xA;    Recording base image digests used&#xA;    registry.access.redhat.com/ubi9/python-39:1-117.1684741281 registry.access.redhat.com/ubi9/python-39:1-117.1684741281@sha256:40a58935b9c22664927b22bf256f53a3d744ddb7316f3af18061099e199526ee&#xA;    Getting image source signatures&#xA;    Copying blob sha256:a3551a1f52c5788c9e4e19e7458ecd57b93554fb4cad127b13d61c73c13775e4&#xA;    Copying blob sha256:d661a108c347030c3ef626a0e0020e084fba1e1023193824f5395fa90ef40bde&#xA;    Copying blob sha256:d93d3cc0bc0c5ed9655bcdcf31183ed0b570076c0e6a13e0d7cb907d0b877b00&#xA;    Copying blob sha256:629980bfa23ec05ce5acc61ed2866ddf8713f40bb2a61f0850395082f1457220&#xA;    Copying blob sha256:bc8a0003b3470be53e5cf295daf38c287d3f20ab90e8f5c2b6f17406b158d323&#xA;    Copying config sha256:ca84e75f124f87650d18f671c13714546ff668228556de54b4b53120968860cb&#xA;    Writing manifest to image destination&#xA;    [2026-05-02T06:03:22,157574695+00:00] End build&#xA;    &#xA;    pod: python-component-sukmsc-on-7390bf2e487a3b4c4aee6988d7d2b712-pod | container step-push: &#xA;    [2026-05-02T06:03:22,816503114+00:00] Update CA trust&#xA;    INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;    &#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;    [2026-05-02T06:03:43,886667723+00:00] Convert image&#xA;    [2026-05-02T06:03:43,887746209+00:00] Push image with unique tag&#xA;    Pushing to quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:python-component-sukmsc-on-pull-request-2vxmt-build-container&#xA;    [retry] executing: buildah push --format=docker --retry 3 --tls-verify=true quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-9a58fff0b20b171aa9240228699291a7c9c1b6fd docker://quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:python-component-sukmsc-on-pull-request-2vxmt-build-container&#xA;    Getting image source signatures&#xA;    Copying blob sha256:a3551a1f52c5788c9e4e19e7458ecd57b93554fb4cad127b13d61c73c13775e4&#xA;    Copying blob sha256:bc8a0003b3470be53e5cf295daf38c287d3f20ab90e8f5c2b6f17406b158d323&#xA;    Copying blob sha256:d93d3cc0bc0c5ed9655bcdcf31183ed0b570076c0e6a13e0d7cb907d0b877b00&#xA;    Copying blob sha256:629980bfa23ec05ce5acc61ed2866ddf8713f40bb2a61f0850395082f1457220&#xA;    Copying blob sha256:d661a108c347030c3ef626a0e0020e084fba1e1023193824f5395fa90ef40bde&#xA;    &#xA;    pod: python-component-sukmsc-on-7390bf2e487a3b4c4aee6988d7d2b712-pod | container step-sbom-syft-generate: &#xA;    &#xA;    pod: python-component-sukmsc-on-7390bf2e487a3b4c4aee6988d7d2b712-pod | container step-prepare-sboms: &#xA;    &#xA;    pod: python-component-sukmsc-on-7390bf2e487a3b4c4aee6988d7d2b712-pod | container step-upload-sbom: &#xA;    &#xA;     pod: python-component-sukmsc-on-pull-request-2vxmt-init-pod | init container: prepare&#xA;    2026/05/02 06:01:09 Entrypoint initialization&#xA;    &#xA;    pod: python-component-sukmsc-on-pull-request-2vxmt-init-pod | container step-init: &#xA;    time=&#34;2026-05-02T06:01:13Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;    time=&#34;2026-05-02T06:01:13Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;    time=&#34;2026-05-02T06:01:13Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;    time=&#34;2026-05-02T06:01:13Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;    time=&#34;2026-05-02T06:01:13Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;    time=&#34;2026-05-02T06:01:13Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;    time=&#34;2026-05-02T06:01:13Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;    time=&#34;2026-05-02T06:01:13Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;    time=&#34;2026-05-02T06:01:13Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;    &#xA;    {&#xA;        s: &#34;\n pod: python-component-sukmsc-on-591f02614276501c9909e28298413f3d-pod | init container: prepare\n2026/05/02 06:01:15 Entrypoint initialization\n\n pod: python-component-sukmsc-on-591f02614276501c9909e28298413f3d-pod | init container: place-scripts\n2026/05/02 06:01:15 Decoded script /tekton/scripts/script-0-42c8p\n2026/05/02 06:01:15 Decoded script /tekton/scripts/script-1-clsx6\n\npod: python-component-sukmsc-on-591f02614276501c9909e28298413f3d-pod | container step-clone: \nINFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt\n{\&#34;level\&#34;:\&#34;info\&#34;,\&#34;ts\&#34;:1777701678.9782343,\&#34;caller\&#34;:\&#34;git/git.go:394\&#34;,\&#34;msg\&#34;:\&#34;Retrying operation (attempt 1)\&#34;}\n{\&#34;level\&#34;:\&#34;info\&#34;,\&#34;ts\&#34;:1777701679.423236,\&#34;caller\&#34;:\&#34;git/git.go:223\&#34;,\&#34;msg\&#34;:\&#34;Successfully cloned https://github.com/redhat-appstudio-qe/sample-multi-component @ 9a58fff0b20b171aa9240228699291a7c9c1b6fd (grafted, HEAD) in path /var/workdir/source\&#34;}\n{\&#34;level\&#34;:\&#34;info\&#34;,\&#34;ts\&#34;:1777701679.4232862,\&#34;caller\&#34;:\&#34;git/git.go:394\&#34;,\&#34;msg\&#34;:\&#34;Retrying operation (attempt 1)\&#34;}\n{\&#34;level\&#34;:\&#34;info\&#34;,\&#34;ts\&#34;:1777701679.4468265,\&#34;caller\&#34;:\&#34;git/git.go:277\&#34;,\&#34;msg\&#34;:\&#34;Successfully initialized and updated submodules in path /var/workdir/source\&#34;}\nMerge option disabled. Using checked-out revision 9a58fff0b20b171aa9240228699291a7c9c1b6fd directly.\n\npod: python-component-sukmsc-on-591f02614276501c9909e28298413f3d-pod | container step-symlink-check: \nRunning symlink check\n\npod: python-component-sukmsc-on-591f02614276501c9909e28298413f3d-pod | container step-create-trusted-artifact: \nPrepared artifact from /var/workdir/source (sha256:30a0bd277a19ad7be874275280017ea11cf53bbb756ca66fd1cdcd2fa0c312c1)\nUsing token for quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc\nExecuting: oras push --annotation=quay.expires-after=5d --registry-config /tmp/create-oci.sh.J0N6ty/auth-CgZpio.json quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-9a58fff0b20b171aa9240228699291a7c9c1b6fd.git SOURCE_ARTIFACT\nUploading 30a0bd277a19 SOURCE_ARTIFACT\nUploaded  30a0bd277a19 SOURCE_ARTIFACT\nPushed [registry] quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc:on-pr-9a58fff0b20b171aa9240228699291a7c9c1b6fd.git\nArtifactType: application/vnd.unknown.artifact.v1\nDigest: sha256:29b0286379e2717b11864360450387a73e9986f6be7c3627aab5854f910f9a93\nArtifacts created\n\n\n pod: python-component-sukmsc-on-7390bf2e487a3b4c4aee6988d7d2b712-pod | init container: prepare\n2026/05/02 06:02:02 Entrypoint initialization\n\n pod: python-component-sukmsc-on-7390bf2e487a3b4c4aee6988d7d2b712-pod | init container: place-scripts\n2026/05/02 06:02:03 Decoded script /tekton/scripts/script-1-wknqh\n2026/05/02 06:02:03 Decoded script /tekton/scripts/script-2-rhf2s\n2026/05/02 06:02:03 Decoded script /tekton/scripts/script-3-xkm58\n2026/05/02 06:02:03 Decoded script /tekton/scripts/script-4-hkg9r\n2026/05/02 06:02:03 Decoded script /tekton/scripts/script-5-n82hr\n\npod: python-component-sukmsc-on-7390bf2e487a3b4c4aee6988d7d2b712-pod | container step-use-trusted-artifact: \nUsing token for quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc\nExecuting: oras blob fetch --registry-config /tmp/use-oci.sh.OztHxz/auth-Sp4x4T.json quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc@sha256:30a0bd277a19ad7be874275280017ea11cf53bbb756ca66fd1cdcd2fa0c312c1 --output -\nRestored artifact quay.io/redhat-appstudio-qe/build-e2e-wqrk/python-component-sukmsc@sha256:30a0bd277a19ad7be874275280017ea11cf53bbb756ca66fd1cdcd2fa0c312c1 to /var/workdir/source\nWARN: artifact URI not provided, (given: =/var/workdir/cachi2)\n\n\npod: python-component-sukmsc-on-7390bf2e487a3b4c4aee6988d7d2b712-pod | container step-build: \n[2026-05-02T06:02:08,343082023+00:00] Validate context path\n[2026-05-02T06:02:08,346510359+00:00] Update CA trust\n[2026-05-02T06:02:08,347544486+00:00] Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt\n&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; ...&#xA;&#xA;Gomega truncated this representation as it exceeds &#39;format.MaxLength&#39;.&#xA;Consider having the object provide a custom &#39;GomegaStringer&#39; representation&#xA;or adjust the parameters in Gomega&#39;s &#39;format&#39; package.&#xA;&#xA;Learn more here: https://onsi.github.io/gomega/#adjusting-output&#xA;In [It] at: /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:161 @ 05/02/26 06:06:08.218&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully for component python-component-sukmsc - /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:159 @ 05/02/26 06:06:08.218 (23m26.122s)&#xA;&gt; Enter [AfterAll] test pac with multiple components using same repository - /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:68 @ 05/02/26 06:06:08.219&#xA;&lt; Exit [AfterAll] test pac with multiple components using same repository - /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:68 @ 05/02/26 06:06:09.454 (1.235s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:28 @ 05/02/26 06:06:09.454&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:28 @ 05/02/26 06:06:10.126 (672ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace merging the PR should be successful [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:164 @ 05/02/26 06:06:10.24&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace leads to triggering on push PipelineRun [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:174 @ 05/02/26 06:06:10.24&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace only one component is changed [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:190 @ 05/02/26 06:06:10.24&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace only related pipelinerun should be triggered [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:205 @ 05/02/26 06:06:10.24&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when a components is created with same git url in different namespace should fail to configure PaC for the component [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.O2kCCFO8V9/tests/build/multi_component.go:264 @ 05/02/26 06:06:10.241&#xA;</system-err>
          </testcase>
      </testsuite>
  </testsuites>